Search Results - (( identification implementation phase algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- identification implementation »
- implementation phase »
- java implementation »
- implementation path »
- phase algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…The design and implementation phase focus on prototype development, while the evaluation phase assesses classification performance. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
9
A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system
Published 2020“…This paper proposes a discrete wavelet transform (DWT)-based Graphical Language classifier algorithm for identification of high-impedance fault (HIF) in medium voltage (MV) distribution network of 13.8 kV. …”
Get full text
Get full text
Get full text
Article -
10
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…To solve this aim, several steps will be used including analysis, design, development, evaluation, and documentation phases. It also has been explained about the use of Convolutional Neural Network (CNN) in the project, the advantages and disadvantages, the implementation of the algorithm in various problem and similar works with the project title. …”
Get full text
Get full text
Thesis -
11
Efficient relay placement algorithm using landscape aware routing (erpalar)
Published 2011“…Main contribution of ERP ALAR include user-centered, cheap, rugged and improved network access system through the following inputs: 3D implementation that takes care of landscape structures such as mountains and hills which is a common phenomenon in rural regions; extension of the current network coverage reach through the use of wireless relays; strategic deployment plan for the rural population through phase-by-phase deployment; cheap and affordable hardware implementation to minimize overall investment cost; and use of rugged WiFi hardware (IEEE 802.11 b) to minimize attention required on maintenance. …”
Get full text
Get full text
Thesis -
12
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
13
A new algorithm for human face detection using skin color tone
Published 2013“…This system can detect a face regardless of the background of the picture, which is an important phase for face identification. The images used in this system are color images which give additional information about the images than the gray images provide. …”
Get full text
Get full text
Get full text
Article -
14
An improved narrowband active noise control system without secondary path modelling based on the time domain
Published 2019“…The acoustic noise generated is further compounded by using secondary path identification which makes the system complex. There are several available ANC algorithms that do not require secondary path estimation for modifying the FxLMS algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Deep learning model for 5W (What, When, Where, Who, and Why) sign language translation system / Raihah Aminuddin, Ummu Mardhiah Abdul Jalil and Norsyamimi Hasran
Published 2023“…The project follows the waterfall model, which consists of four phases: requirement analysis, design, implementation, and testing. …”
Get full text
Get full text
Get full text
Book Section -
16
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…The use of feature selection as one of the important machine learning task is often disregarded in Writer Identification domain, with only a handful of studies implemented feature selection phase. …”
Get full text
Get full text
Book Chapter -
17
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…The use of feature selection as one of the important machine learning task is often disregarded in Writer Identification domain, with only a handful of studies implemented feature selection phase. …”
Get full text
Get full text
Book Chapter -
18
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…Several phases are involved, namely as the identification of the document's atributes, implementation of NN, identification of NN parameters and development of simple search engine prototype. 53 documents have been uploaded into the database for evaluation purpose. …”
Get full text
Get full text
Get full text
Thesis -
19
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive
Published 2010“…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
Get full text
Get full text
Thesis
