Search Results - (( developing defect classification algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- defect classification »
- developing defect »
- validation using »
- java validation »
- using algorithm »
-
1
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…The key metrics for the evaluation are classification accuracy, classification precision and classification recall. 855 images were used to train and test the algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…Further work will focus on ascertaining the stability of the FAM network in defect classification, as well as on improving the overall performance of the defect detection algorithms developed in this project. …”
Get full text
Monograph -
3
Neural network paradigm for classification of defects on PCB
Published 2003“…The algorithms to segment the image into basic primitive patterns, enclosing the primitive patterns, patterns assignment, patterns normalization, and classification have been developed based on binary morphological image processing and Learning Vector Quantization (LVQ) neural network. …”
Get full text
Get full text
Article -
4
-
5
A cascading fuzzy logic with image processing algorithm-based defect detection for automatic visual inspection of industrial cylindrical object’s surface
Published 2018“…The image processing algorithm has been developed to extract the main features of the tested objects such as defects, borders, and noise. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…However, high similarity of characteristics among the shapes and textures has been a major challenge in defect classification process. The objective of this research was to develop and analyse feature extraction used for classification techniques for defect detection of solar photovoltaic modules surfaces. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Internal defect detection and reconstruction framework for laminated glass fibre reinforced polymer composite materials
Published 2013“…Therefore, by removmg the low frequency signals, the intemal defect detectability can be improved. Moreover, the classification of an input pattem based on the closest neighbours of the point of interest provides more accurate defect detection in comparison with the classification based on experience data as the defect pattems vary on circumstances in ultrasonic NDE problems.…”
Get full text
Get full text
Thesis -
8
Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation
Published 2016“…The classification combines the analysis of defect intensity features, the application of unsupervised k-mean clustering and multi-class SVM algorithms. …”
Get full text
Get full text
Thesis -
9
Hybrid multilayered perceptron network for classification of bundle branch blocks
Published 2012Get full text
Working Paper -
10
Identification of weld defect through the application of denoising method to the sound signal acquired during pulse mode laser welding
Published 2023“…The root-mean-square and spectral entropy of both unfiltered and filtered signals were extracted, and classification models were developed using these data sets. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A three dimensional (3D) vision based defect inspection system for gluing application
Published 2013“…Each defect has special characteristic. Inspection system developed to identify problems occurs in gluing process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
13
-
14
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
15
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…In this research work, the motivation is to develop an autonomous learning model based on the hybridization of an adaptive ANN and a metaheuristic algorithm for optimizing ANN parameters so that the network could perform learning and adaptation in a more flexible way and handle condition classification tasks more accurately in industries, such as in power systems. …”
Get full text
Get full text
Get full text
Thesis -
16
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
17
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
19
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
20
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item
