Search Results - (( points detection based algorithm ) OR ( based identification based algorithm ))*

Refine Results
  1. 1

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Improved robust principal component analysis based on minimum regularized covariance determinant for the detection of high leverage points in high dimensional data by Habshah Midi, Jaaz Suhaiza, Mohd Aslam, Hani Syahida, Emi Amielda

    Published 2025
    “…The performance of the IRPCA is compared to the ROBPCA and the Minimum Regularized Covariance Determinant and PCA-based method (MRCD-PCA) for the identification of HLPs in HDD. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Improved robust principal component analysis based on minimum regularized covariance determinant for the detection of high leverage points in high dimensional data (penambahbaikan... by Midi, Habshah, Suhaiza, Jaaz, Mohd Aslam, ., Hani Syahida, ., Emi Amielda, .

    Published 2025
    “…The performance of the IRPCA is compared to the ROBPCA and the Minimum Regularized Covariance Determinant and PCA-based method (MRCD-PCA) for the identification of HLPs in HDD. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The objectives of this research include assessing the impact of UAV height and applying the Difference of Gaussian (DoG) Algorithms in crack identification. The goal here is to establish the level of effectiveness of the DoG algorithm in detecting cracks in images derived from orthomosaics at different heights. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Video image processing for traffic analysis by Che Puan, Othman

    Published 1992
    “…The identification of the presence of an individual vehicle based on brightness information at relatively few sample points within the images was possible. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Gas Identi cation by Using a Cluster-k-Nearest-Neighbor by Brahim Belhaouari, samir

    Published 2009
    “…In this paper, a novel gas identification approach based on Cluster-k-Nearest Neighbor. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Robust Estimation Methods And Outlier Detection In Mediation Models by Fitrianto, Anwar

    Published 2010
    “…We suggest an alternative method for identification of high leverage points in the mediation model. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fault-tolerant power extraction strategy for photovoltaic energy systems by Boutasseta, Nadir, Ramdani, Messaoud, Mekhilef, Saad

    Published 2018
    “…The FDI method is based on monitoring the PV panel generated power for the presence of abrupt changes; the MPPT reconfiguration is based on a combination between Incremental Conductance (IncCond) Algorithm and an Improved Current-based Particle Swarm Optimization (ICPSO) tracking technique. …”
    Get full text
    Get full text
    Article
  14. 14

    Detection of micro emboli using signal energy and discrete fourier transform / Basil Mathew Panamkuttiyil by Basil Mathew , Panamkuttiyil

    Published 2011
    “…The designed algorithm was able to detect presence of emboli with considerable accuracy. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing by Hamzah N.A., Jaaz Z.A., Al-Bakri N.F., Tawfeq J.F., Radhi A.D.

    Published 2024
    “…Experimental results show that the algorithm achieves good results in fingerprint processing, both fast and accurate. � 2023 IEEE.…”
    Conference Paper
  16. 16

    Studies on the application of wavelet families for a high impedance fault location algorithm in a distribution network by Ali, M.S., Bakar, Ab Halim Abu, Tan, Chia Kwang, Mokhlis, Hazlie, Arof, Hamzah

    Published 2016
    “…This paper will present an enhanced high impedance fault location algorithm based on the database technique. This paper is an extension of a faulty section identification algorithm developed previously. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin by Jamaludin, Nur Fadhilah

    Published 2015
    “…In addition, the flicker source identification based on the Fast Fourier Transform (FFT) demodulation technique also has been proposed in this study. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An effective source number enumeration approach based on SEMD by Ge, Shengguo, Mohd Rum, Siti Nurulain, Ibrahim, Hamidah, Marsilah, Erzam, Perumal, Thinagaran

    Published 2022
    “…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
    Get full text
    Get full text
    Article
  20. 20

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. …”
    Get full text
    Get full text
    Thesis