Search Results - (( developing robust selection algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- selection algorithm »
- developing robust »
- java segmentation »
- robust selection »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Robust variable selection methods for large- scale data in the presence of multicollinearity, autocorrelated errors and outliers
Published 2016“…We develop Robust Forward Selection algorithm based on RFCH correlation coefficient (RFS.RFCH) because FS.Winso is not robust to multivariate outliers. …”
Get full text
Get full text
Thesis -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…In addressing this problem, some robust procedures for high dimensional dataset via the RFCH algorithm are developed. …”
Get full text
Get full text
Thesis -
5
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…The results on the model selection again signify that our proposed robust bootstrap model selection method is more robust than the classical bootstrap model selection.…”
Get full text
Get full text
Thesis -
6
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013“…Recently, the robust deconvolution algorithms that tolerate high levels of errors in pressure and rate than the previous deconvolution algorithms have been introduced in the literature. …”
Get full text
Get full text
Final Year Project -
7
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
Get full text
Get full text
Thesis -
9
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…The second level compnses of two HS optimization algorithms developed and coded for robust stability examinations. …”
Get full text
Get full text
Thesis -
10
Development of robust procedures for partial least square regression with application to near infrared spectral data
Published 2021“…To fill-in the gap in the literature, a new robust procedure in wavelength selection based on input scaling method is developed using Filter-Wrapper method. …”
Get full text
Get full text
Thesis -
11
Application of artificial immune system in designing power systems stabilizer
Published 2007“…Mimicking and imitating of biological immune system or better known as the artificial immune system is thus developed. Applying and implementing of the algorithm of the artificial immune system is to develop an immune controller. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…This thus requires a priori selection of weighting structures. Practical implications – The proposed MODE-infinity controller algorithm is expected to ease the design and deployment of the robust controller in autonomous helicopter application especially for practicing engineer with little experience in advance control parameters tuning. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.]
Published 2025“…Hence, it is crucial to determine ML models that are robust against such disruptions. In this paper, three algorithms were developed: the first was for outlier removal from features, the second was for feature selection, and the third was for partial-features-availability-aware ML model selection. …”
Get full text
Get full text
Get full text
Article -
15
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
16
-
17
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
Published 2021“…This paper introduces a new variant of a metaheuristic algorithm based on Tiki-Taka algorithm, called selective chaotic maps Tiki-Taka algorithm (SCMTTA). …”
Get full text
Get full text
Get full text
Article -
18
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
19
Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction
Published 2024“…To address these challenges, this research introduces a novel Depth Linear Discrimination-Oriented Feature Selection Method based on Adaptive Sine Cosine Algorithm, named Depth Adaptive Sine Cosine Feature Selection (DASC-FS). …”
Get full text
Get full text
Get full text
Article -
20
Designing an algorithm for bioloid humanoid navigating in its indoor environment
Published 2012“…As the navigation map is predetermined, the designed algorithm animates the humanoid to navigate by selecting an optimal route, depending on some external commands, to reach at the goal position. …”
Get full text
Get full text
Get full text
Article
