Search Results - (( developing scale detection algorithm ) OR ( java optimization method algorithm ))
Search alternatives:
- java optimization »
- developing scale »
- method algorithm »
- scale detection »
-
1
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
5
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A multi-scale dual-stage model for PV array fault detection, classification, and monitoring technique
Published 2022“…The experimental results show that the developed algorithm using supervised learning algorithms mutual with k-fold cross-validation has produced good performances in identifying six common faults of photovoltaic arrays, achieved 100% accuracy in fault detection, and achieved good accuracy in fault classification. …”
Get full text
Get full text
Get full text
Article -
7
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
8
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The data from photodiode is read by LabVIEW software for further develop to obtain useful output data. The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Article -
10
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Conference or Workshop Item -
11
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
13
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
16
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
17
Detection Of Misplaced And Missing Regions In Image Using Neural Network
Published 2017“…Therefore, it is necessary to develop an algorithm that is able to detect both misplaced and missing jigsaw puzzles. …”
Get full text
Get full text
Thesis -
18
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
19
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
20
Vehicle Detection in Deep Learning
Published 2019“…With the development of computer vision techniques and accessibility of large-scale traffic transport data, deep learning has been enabled to on-road vehicle detection algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
