Search Results - (( frames detection device algorithm ) OR ( based optimization method algorithm ))

Refine Results
  1. 1

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Object tracing from synthetic fluid spray through instance segmentation by Md Refat Khan, Pathan

    Published 2024
    “…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of elasto-plastic viscous damper finite element model for reinforced concrete frames by Hejazi, Farzad, Zabihi, Alireza, Jaafar, Mohd Saleh

    Published 2014
    “…The evaluation of seismic response of structure and damage detection in structural members and damper device was carried out by 3D modeling, of 3 story reinforced concrete frame building under earthquake multi-support excitation.…”
    Get full text
    Get full text
    Article
  4. 4

    Detection of micro emboli using signal energy and discrete fourier transform / Basil Mathew Panamkuttiyil by Basil Mathew , Panamkuttiyil

    Published 2011
    “…The designed algorithm was able to detect presence of emboli with considerable accuracy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    OPTIMIZED ARCHITECTURE DESIGN AND IMPLEMENTATION OF OBJECT TRACKING ALGORITHM ON FPGA by ABDELFATAH EL-KHATIB, LINA NOAMAN

    Published 2013
    “…The Adaptive Hybrid Difference algorithm (AHD), which is used to detect the moving objects, was chosen to be implemented on FPGA due to its computation ability and efficiency with regard to hardware implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Passenger Counting With Face Detection by Teoh, Han Wei

    Published 2020
    “…MobileNet-single shot detector (SSD) is chosen as the object detector model since it belongs to a class of efficient models that can execute on mobile and embedded systems. While running detections across every video frames, centroid tracking algorithm tracks every unique person in video streams, where Kalman filter is further applied to reduce the noise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Real-time vehicle counting using custom YOLOv8n and DeepSORT for resource-limited edge devices by Saadeldin, Abuelgasim, Rashid, Muhammad Mahbubur, Shafie, Amir Akramin, Hasan, Tahsin Fuad

    Published 2024
    “…The proposed system was able to achieve an average vehicle detection mean average precision (mAP) score of 97.5%, a vehicle counting accuracy score of 96.8% and an average speed of 19.4 frames per second (FPS), all while being deployed on a compact Nvidia Jetson Nano edge-computing device. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development of automatic obscene images filtering using deep learning by Awad, Abdelrahman Mohamed, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Ismail, Nanang

    Published 2021
    “…The whole recognition process can be divided into two stages, including fine detection and focus detection. The fine detection includes skin color detection with YCbCr and HSV color spaces and accurate face detection using the Adaboost algorithm with Haar-like features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  11. 11

    Enhancing safety of micro-mobility and powered mobility devices using YOLOv12-based real-time obstacle detection by Gunawan, Teddy Surya, Azlin, Amirul Aiman, Kartiwi, Mira, Md Yusoff, Nelidya

    Published 2025
    “…The model was converted to the NCNN format for lightweight deployment, enabling average inference at 214.3 ms per frame. Field tests across environments with minimal, moderate, and high obstacle densities validated the system’s real-time tracking, with DeepSORT reducing duplicate detections by over 40%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Opposition-based Whale Optimization Algorithm by Alamri, Hammoudeh S., Alsariera, Yazan A., Kamal Z., Zamli

    Published 2018
    “…The OWOA use the Opposition-based method to enhance Whale Optimization Algorithm (WOA) performance. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Shunt active power filter with modified synchronous reference frame technique and fuzzy logic current controller for harmonic mitigation by Suleiman, Musa

    Published 2017
    “…For efficient compensation, SAPF greatly depends on fast and accurate detection of reference harmonic current. To generate the reference signals, modified synchronous reference frame (MSRF) technique is chosen. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
    Get full text
    Get full text
    Article
  19. 19

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz by Abdul Aziz, Nurizzati

    Published 2016
    “…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
    Get full text
    Get full text
    Thesis