Search Results - (( image classification path algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2

    Implementation of vision-assisted path planning system for bulk die sorting in semiconductor industry by Yap, Hwa Jen, Ooi, C.H., Chang, Siow Wee

    Published 2018
    “…Subsequently, point and coverage path planning algorithms are applied to determine the optimum path for physical die sorting operation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Implementation of vision-assisted path planning system for bulk die sorting in semiconductor industry by Yap, Hwa Jen, Ooi, C.H., Chang, Siow Wee

    Published 2018
    “…Subsequently, point and coverage path planning algorithms are applied to determine the optimum path for physical die sorting operation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Developing and validating a simulation model for counting and classification of vehicles by Ali Emad Jehad, Riza Atiq O.K. Rahmat

    Published 2016
    “…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Jamaludin, Sallim, Kohbalan, Moorthy

    Published 2021
    “…Finally, the results were compared with the existing proposed Flower Pollination Algorithm (FPA) at the time of FCC extraction. The results show that WOA is a bit better at getting shorter path lengths than FPA in terms of path lengths. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…The proposed vegetation encroachment detection framework used the state-of-art RetinaNet model to identify and locate the power transmission towers from satellite images. A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
    text::Thesis
  12. 12
  13. 13

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Parallel imaging is a robust method for accelerating the data acquisition in Magnetic Resonance Imaging (MRI). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Oil Palm Yield Data Collection Using Image Processing by Yee, Rachel Jee San

    Published 2021
    “…Autonomous drone also plays a big role in this system as it helps in capturing the images from the oil palm plantation. This area involves techniques such as path finding and stabilising in order to control the drone. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…The classification task is performed through multi-label classification, wherein each object in an image can belong to multiple classes simultaneously, and the network generates a grid of bounding boxes and corresponding confi dence scores for each class. …”
    Get full text
    Get full text
    Get full text
    Article