Study the field of view influence on the monchromatic and polychromatic image quality of a human eye
In this paper, the effect of the eye field of view (known as F.O.V.) on the performance and quality of the image of the human eye is studied, analyzed, and presented in detail. The image quality of the retinal is numerically analyzed using the eye model of Liou and Brennan with this polymer contact...
| Main Authors: | Qasim, Adeeb Mansoor, Aljanabi, Mohammad, Shahreen, Kasim, Mohd Arfian, Ismail, Gusman, Taufik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Politeknik Negeri Padang
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/34928/ http://umpir.ump.edu.my/id/eprint/34928/1/Study%20the%20field%20of%20view%20influence%20on%20the%20monchromatic%20and%20polychromatic%20image%20quality%20of%20a%20human%20eye.pdf |
Similar Items
Low-complexity single-view and multi-view visual compression for visual sensor networks using block-based compressive sensing.
by: Mansoor Ebrahim,
Published: (2016)
by: Mansoor Ebrahim,
Published: (2016)
A GPU accelerated parallel genetic algorithm for the traveling salesman problem
by: Binjubier, Mohammed, et al.
Published: (2024)
by: Binjubier, Mohammed, et al.
Published: (2024)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
by: Aljanabi, Mohammad, et al.
Published: (2020)
by: Aljanabi, Mohammad, et al.
Published: (2020)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Large Dataset Classification Using Parallel Processing Concept
by: Aljanabi, Mohammad, et al.
Published: (2020)
by: Aljanabi, Mohammad, et al.
Published: (2020)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm
by: Mohd Arfian, Ismail, et al.
Published: (2017)
by: Mohd Arfian, Ismail, et al.
Published: (2017)
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
by: Ashraf Osman, Ibrahim, et al.
Published: (2019)
by: Ashraf Osman, Ibrahim, et al.
Published: (2019)
Effects of eye health among youngster while playing computer game
by: Nurul Saidatul Akmal, Ab. Razak, et al.
Published: (2021)
by: Nurul Saidatul Akmal, Ab. Razak, et al.
Published: (2021)
Industry 4.0: Eyeing The Future via Simulation
by: Aisyah, Ibrahim, et al.
Published: (2020)
by: Aisyah, Ibrahim, et al.
Published: (2020)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Pembangunan sistem bajet ladang untuk LKPP Corp. Sdn. Bhd. yang teragih, pelbagai aras dan pelbagai perusahaan
by: Kasim, Shahreen
Published: (2005)
by: Kasim, Shahreen
Published: (2005)
A Preliminary Study of High-Field MRI Image Enhancement Techniques Applied to Low-Field MR Brain Images
by: N. F., Ishak, et al.
Published: (2008)
by: N. F., Ishak, et al.
Published: (2008)
Comparison of meta-heuristic algorithms for fuzzy modelling of covid-19 illness’ severity classification
by: Nur Azieta, Mohamad Aseri, et al.
Published: (2022)
by: Nur Azieta, Mohamad Aseri, et al.
Published: (2022)
Eye drawing using gaze estimation model
by: Chiu, Po Chan
Published: (2009)
by: Chiu, Po Chan
Published: (2009)
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
by: Nur Farahaina, Idris, et al.
Published: (2022)
by: Nur Farahaina, Idris, et al.
Published: (2022)
The Effectiveness of Cloud-Based E-Learning towards Quality of Academic Services: An Omanis’ Expert View
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Dynamic resource monitoring system with dynamic aggregate view
by: Kee, Cia Hee
Published: (2011)
by: Kee, Cia Hee
Published: (2011)
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023)
by: Noor Syahirah, Nordin, et al.
Published: (2023)
Permutation entropy based full-reference image
quality qssessment
by: Baqar, Mohtashim *, et al.
Published: (2019)
by: Baqar, Mohtashim *, et al.
Published: (2019)
Detection of eye movements based on EEG signals and the SAX algorithm
by: Shanmuga, P. M. M., et al.
Published: (2018)
by: Shanmuga, P. M. M., et al.
Published: (2018)
Newton competitive genetic algorithm method for optimization the production of biochemical systems
by: Mohd Arfian, Ismail, et al.
Published: (2018)
by: Mohd Arfian, Ismail, et al.
Published: (2018)
Multi-objective Optimization of Biochemical System Production
Using an Improve Newton Competitive Differential Evolution Method
by: Mohd Arfian, Ismail, et al.
Published: (2017)
by: Mohd Arfian, Ismail, et al.
Published: (2017)
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019)
by: Noor Syahirah, Nordin, et al.
Published: (2019)
Live view contact lens systems for cosplay
by: Tan, Ai Tee
Published: (2018)
by: Tan, Ai Tee
Published: (2018)
Big data streaming platforms : A review
by: Kumar, Harish, et al.
Published: (2022)
by: Kumar, Harish, et al.
Published: (2022)
A study on partial face recognition of eye region
by: Teo, Chuan Chin, et al.
Published: (2007)
by: Teo, Chuan Chin, et al.
Published: (2007)
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Fast image watermarking based on signum of cosine matrix
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Comparison of Denoising Techniques Applied on Low-Field MR Brain Images
by: Ishak, N. F., et al.
Published: (2008)
by: Ishak, N. F., et al.
Published: (2008)
Using cascade CNN-LSTM-FCNs to identify AI-altered video based on eye state sequence
by: Muhammad Salihin, Saealal, et al.
Published: (2022)
by: Muhammad Salihin, Saealal, et al.
Published: (2022)
An analysis of commit-time requirements for ontology views
by: Ahmad, Mohammad Nazir, et al.
Published: (2008)
by: Ahmad, Mohammad Nazir, et al.
Published: (2008)
Loan eligibility classification using logistic regression
by: Lik Pao, Paul Law, et al.
Published: (2023)
by: Lik Pao, Paul Law, et al.
Published: (2023)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Comparison between ANN and multiple linear regression models for prediction of warranty cost
by: Mohd Faaizie, Darmawan, et al.
Published: (2018)
by: Mohd Faaizie, Darmawan, et al.
Published: (2018)
A comparative study on eye tracking existing techniques
by: Bilal, Sara Mohammed Osman Saleh, et al.
Published: (2014)
by: Bilal, Sara Mohammed Osman Saleh, et al.
Published: (2014)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Similar Items
-
Low-complexity single-view and multi-view visual compression for visual sensor networks using block-based compressive sensing.
by: Mansoor Ebrahim,
Published: (2016) -
A GPU accelerated parallel genetic algorithm for the traveling salesman problem
by: Binjubier, Mohammed, et al.
Published: (2024) -
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021) -
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
by: Aljanabi, Mohammad, et al.
Published: (2020) -
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)