Search Results - (( new validation study algorithm ) OR ( shape identification tree algorithm ))
Search alternatives:
- shape identification »
- identification tree »
- new validation »
- tree algorithm »
-
1
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
5
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…The result obtained in this study show statistically difference in rotation angle between the new and previous study. …”
Get full text
Get full text
Thesis -
6
Content-based indexing of low resolution documents
Published 2016“…Tree indexing for extracted layout and shape features are structured hierarchically and Euclidean distance is used to get similarity image for CBIR. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…Whereas, the validation from the real-world of the two datasets showed that the new augmentation algorithm steadily producing lesser iteration number compared to the conventional Simplex, QSM and BLSA algorithms. …”
Get full text
Get full text
Get full text
Thesis -
8
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. …”
Get full text
Get full text
Get full text
Article -
9
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…A new algorithms with different numbers of queues to improve the performance of the Central Processing Unit. …”
Get full text
Get full text
Thesis -
10
Classification Modeling for Malaysian Blooming Flower Images Using Neural Networks
Published 2013“…Nevertheless, the developed flower model can be used as part of the Malaysian Blooming Flower recognition system in the future where the colours and texture are needed in the flower identification process.…”
Get full text
Get full text
Get full text
Thesis -
11
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. …”
Get full text
Get full text
Thesis -
12
Identifying homogeneous rainfall catchments for non-stationary time series using TOPSIS algorithm and bootstrap K-sample Anderson-Darling test
Published 2018“…The new algorithm is based on the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis -
14
-
15
New fundamental theory in solving the royalty payment problem / Wan Noor Afifah Wan Ahmad and Suliadi Firdaus Sufahani
Published 2020“…Therefore, the indirect method was applied by involving new modified shooting method (Sufahani-Ahmad-Newton-Golden-Royalty Algorithm and Sufahani-Ahmad-Powell-Golden-Royalty Algorithm). …”
Get full text
Get full text
Conference or Workshop Item -
16
Multi-Objective Search Group Algorithm for engineering design problems
Published 2022“…This study proposes a new multi-objective version of the Search Group Algorithm (SGA) called the Multi-Objective Search Group Algorithm (MOSGA). …”
Get full text
Get full text
Article -
17
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Evaluation of these algorithms showed that the results are unsatisfactory due to the lower validity and accuracy of these algorithms. …”
Get full text
Get full text
Thesis -
18
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
Get full text
Get full text
Thesis -
19
A new standardisation and selection framework for real-time image dehazing algorithms from multi-foggy scenes based on fuzzy Delphi and hybrid multi-criteria decision analysis meth...
Published 2020“…To address this gap, this study proposes a new standardisation and selection framework based on fuzzy Delphi (FDM) and hybrid multi-criteria analysis methods. …”
Get full text
Get full text
Get full text
Article -
20
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item
