Search Results - primitive based techniques
Search alternatives:
- based techniques »
-
1
3D character reconstruction from 2D orthogonal images
Published 2025“…This research contributes a flexible and artist-friendly reconstruction algorithm that capable of generating part-level primitive shapes, which is efficient for generating high-fidelity mesh using box modelling and digital sculpting techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Neural network paradigm for classification of defects on PCB
Published 2003“…The algorithms to segment the image into basic primitive patterns, enclosing the primitive patterns, patterns assignment, patterns normalization, and classification have been developed based on binary morphological image processing and Learning Vector Quantization (LVQ) neural network. …”
Get full text
Get full text
Article -
3
A universal relation approach for natural query in logic database system
Published 1992“…Currently, the form of query is based on the primitive logic form. Therefore, this project aims at developing a prototype natural query system to the logic database as a compromise between the primitive logic query and the natural language query systems. …”
Get full text
Get full text
Article -
4
A modified crow search algorithm with niching technique for numerical optimization
Published 2019“…This paper proposes a modified crow search algorithm with local search and niching technique. The primitive crow search algorithm is a newly developed population-based algorithm which gained attention from the researchers of many fields as it needs only one parameter to be tuned. …”
Get full text
Get full text
Conference or Workshop Item -
5
A modified crow search algorithm with niching technique for numerical optimization
Published 2019“…This paper proposes a modified crow search algorithm with local search and niching technique. The primitive crow search algorithm is a newly developed population-based algorithm which gained attention from the researchers of many fields as it needs only one parameter to be tuned. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Cryptanalysis of fruit-80, craft and cham lightweight symmetric-key cryptographic primitives
Published 2021“…The objective of this thesis is to study the security level of selected lightweight ciphers, namely Fruit-80, CRAFT and CHAM, to apply cryptanalytic techniques on the selected ciphers, and to study the impact of the cryptanalytic techniques on these three ciphers. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Inner AABB For Distance Computation In Collision Detection
Published 2016“…Based on the analyzed results, we believed that our technique is superior compared to other techniques in term of the speed of the detection.…”
Get full text
Get full text
Article -
9
Colony membership, division of labor, and genetic relatedness among females of colonies of eustenogaster fraterna (Hymenoptera, Vespidae, Stenogastrinae)
Published 2002“…To compare the social structure of primitively social wasps with that of communal breeding vertebrates, we used a new technique based on micro videocameras applied to the nest envelope to study the organization of behavior in Malaysian colonies of the stenogastrine wasp Eustenogaster fraterna. …”
Get full text
Get full text
Article -
10
-
11
The development of a commercially viable database encryption tool for Oracle8i Rdbms
Published 2005“…The investigation yields a new multilevel security scheme based on indigenous cryptographic primitives and supported by a new key management technique. …”
Get full text
Get full text
Monograph -
12
Jawi sub-word recognition system using window-based segmentation-free approach / Roslim Mohamad
Published 2018“…For the recognition system based on model development using windows, the presence of such features cause the resulting model to be less consistent, where it produces a different sequence of primitive structures of words/ sub-words from the same lexicon. …”
Get full text
Get full text
Book Section -
13
Jawi sub-word recognition system using window-based segmentation-free approach / Roslim Mohamad
Published 2017“…For the recognition system based on model development using windows, the presence of such features cause the resulting model to be less consistent, where it produces a different sequence of primitive structures of words/sub-words from the same lexicon. …”
Get full text
Get full text
Thesis -
14
Car plate recognition based on stroke composition technique / Samsul Setumin, Mohd Ikmal Fitri Maruzuki and Shahrul Nizam Ishak.
Published 2012“…Although stroke analysis is a powerful technique in the recognition of characters, it is a rather difficult and complicated technique to be implemented. …”
Get full text
Get full text
Research Reports -
15
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…There are many time series data reduction methods, ranging from primitive data aggregation such as Rate of Change to sophisticated compression algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Measuring distance between nearly intersected objects in narrow phase collision detection
Published 2013“…In this paper, we explained the procedures of using Heron’s Formula and vector-based techniques for computing distance and the experimental results between those two techniques. …”
Get full text
Get full text
Get full text
Article -
18
Design And Implementation Of Multiplexed And Obfuscated Physical Unclonable Function.
Published 2021“…Nevertheless, its function is vulnerable to model-building attacks by using ML techniques. Arbiter-PUF is one of the earliest proposed delay-based PUFs which is vulnerable to ML-attack. …”
Get full text
Get full text
Get full text
Article -
19
Building footprint extraction using multi-resolution segmentation and support vector machine classification in UiTM Perlis / Muhammad Syamim Nabil Mohd Salleh
Published 2024“…The MRS was able to segment the buildings appropriately while the SVM classifier provided such an accurate classification which the overall accuracy and kappa coefficient obtained were 85% and 0.785 respectively. Based on the accuracy assessment, the techniques used in this study was able to provide reliable the data of buildings footprints which the tolerance of differences in length measurements does not exceed than two (2) meters of accuracy. …”
Get full text
Get full text
Student Project -
20
A reliable PUF in a dual function SRAM
Published 2019“…Furthermore, we propose a bit selection technique to mitigate the NBTI effect. We show that this technique can reduce the predicted bit error in an SRAM-PUF from 14.18% to 5.58% over 5 years. …”
Get full text
Get full text
Get full text
Get full text
Article
