Search Results - (( based extraction path algorithm ) OR ( java application force algorithm ))
Search alternatives:
- application force »
- based extraction »
- java application »
- extraction path »
- force algorithm »
- path algorithm »
-
1
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…The routing problems in VLSI physical design are, in essence, shortest path problems in special graphs. It has been shown that the performance of a graph-based shortest path algorithm can severely be affected by the performance of its priority queue. …”
Get full text
Get full text
Get full text
Thesis -
3
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…This development and study of the path extract method carries significance in areas of EDA and debug diagnosis work.…”
Get full text
Get full text
Thesis -
4
-
5
STEP-NC Interpolator for General 2D and 3D Parametric Curve / Dzullijah Ibrahim...[et al.]
Published 2017“…A STEP-NC interface to OAPC-NC interpolator using STEP-NC tool path data is proposed and developed. A hierarchical-based algorithm is used to extract the tool path data from STEP-NC tool path file of a product model. …”
Get full text
Get full text
Article -
6
-
7
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
8
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…Also, a corridor extraction algorithm has been developed to extract the region of interest (ROI) around the transmission towers. …”
text::Thesis -
9
Deep Learning-Based Geomagnetic Navigation Method Integrated with Dead Reckoning
Published 2023“…To address these issues, we propose a coarse-to-fine geomagnetic indoor localization method based on deep learning. First, a multidimensional geomagnetic feature extraction method is presented which can extract magnetic features from spatial and temporal aspects. …”
Get full text
Get full text
Get full text
Article -
10
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
11
Optimization And Execution Of Multiple Holes-Drilling Operations Based On STEP-NC
Published 2021“…The newly developed system combines between open CNC control system and ant colony optimization (ACO) algorithm by using LabVIEW software. A developed system is based on STEP-NC interpretation, optimization, 3D simulation, and automatic document generation modules that have been used to verify and validate the system in extract and optimize STEP-NC drilling codes. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…At first, the hybrid architecture was designed for the quantum algorithms. Then, the relationship between classical and quantum parts of the hybrid algorithms were extracted and the main stages of the hybrid algorithm were determined. …”
Get full text
Get full text
Thesis -
13
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
14
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
15
Sensors Fusion based Online Mapping and Features Extraction of Mobile Robot in the Road Following and Roundabout
Published 2016“…A road feature extraction based mapping system using a sensor fusion technique for mobile robot navigation in road environments is presented in this paper. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…The feature enhancement task is performed by applying the Path Aggregation Network (PANet) and Spatial Pyramid Pooling Network (SPPNet) algorithms, which are deployed to enhance the extracted and generated features. …”
Get full text
Get full text
Get full text
Article -
17
ROBOT NAVIGATION USING CAMERA BY IDENTIFYING SIGNAGES
Published 2017“…Camera mounted on the mobile robot will capture image of the signage and later employed edge-based contour detection algorithm to extract information from the signage. …”
Get full text
Get full text
Final Year Project -
18
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…Performance results show that the MADE algorithm based on lead-acid battery has a high level of LLP and minimum cost among other types of storage batteries. …”
Get full text
Get full text
Thesis -
19
A review of slicing techniques in software engineering
Published 2015“…Process of model based slicing is utilized to extract the desired lump out of slice diagram. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis
