Search Results - (( developing automatic identification algorithm ) OR ( java location based algorithm ))
Search alternatives:
- identification algorithm »
- developing automatic »
- java »
-
1
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Secondly, it aims to develop an automatic gender recognition model by employing optimization algorithms to identify the most effective channels for gender identification from emotional-based EEG signals. …”
Get full text
Get full text
Article -
2
Feature extraction using spectral centroid and mel frequency cepstral coefficient for Quranic accent automatic identification
Published 2014Get full text
Get full text
Conference or Workshop Item -
3
Development of Acute Stroke Lesion Segmentation Algorithm in Brain MRI using Pseudo-colour with K-means Clustering
Published 2021“…Research has shown that an automated segmentation from the Magnetic Resonance Image (MRI) is potentially giving more effective and accurate results. This study aims to develop an automatic segmentation by utilizing clustering algorithm for acute ischemic stroke lesion identification. …”
Get full text
Get full text
Get full text
Thesis -
4
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…So far, several attempts were made to develop automatic systems to help neurophysiologists accurately identify epileptic seizures. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
Get full text
Get full text
Thesis -
7
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
Published 2023“…Theseempiricalresults also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.…”
Get full text
Get full text
Get full text
Article -
8
-
9
Online fingerprint recognition
Published 2010“…For minutiae matching, the matching algorithm has been developed. This algorithm is capable of finding the correspondences between minutiae in the input image and store template. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
11
Control of pallets in automatic storage and retrieval system
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
12
Assessment of ANN-based auto-reclosing scheme developed on single machine-infinite bus model with IEEE 14-bus system model data
Published 2009“…The results show the efficacy of the developed adaptive automatic reclosing method.…”
Get full text
Get full text
Conference or Workshop Item -
13
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
14
CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING
Published 2018“…This method is very tedious and subjective due to different level of expertise and experience. There is a need to develop a low cost automatic corrosion damage identification. …”
Get full text
Get full text
Final Year Project -
15
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…It directed towards the illumination-invariant automatic recognition of faces and analysis to improve face verification and identification performance.To compare with other feature extraction at the end of the study, an evaluation has been done with an existing face recognition system using AAM algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm
Published 2019“…The performance of the algorithm showed that the execution time of ACO is more realistic. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Embedded automated vision for double parking identification system
Published 2018“…A camera was utilized to acquire the image of a parking area, and the image was processed using Beaglebone Black processor. A computer vision algorithm was developed to process the image using background subtraction, region of interest identification, and color analysis. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Self-Adaptive Autoreclosing Scheme usingI Artificial Neural Network and Taguchi's Methodology in Extra High Voltage Transmission Systems
Published 2009“…The fault identification prior to reclosing is based on optimized artificial neural network associated with three training algorithms, namely, Standard Error Back-Propagation, Levenberg Marquardt and Resilient Back-Propagation algorithms. …”
Get full text
Get full text
Thesis
