Search Results - (( java application path algorithm ) OR ( using internal perception algorithm ))
Search alternatives:
- perception algorithm »
- internal perception »
- java application »
- application path »
- path algorithm »
- using internal »
-
1
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
2
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
3D LiDAR Vehicle Perception and Classification Using 3D Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Demand analysis of flood insurance by using logistic regression model and genetic algorithm
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Adaptive regularizer for recursive neural network training algorithms
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Shape matching and object recognition using dissimilarity measures with Hungarian algorithm
Published 2009Get full text
Working Paper -
10
-
11
Prediction of college student academic performance using data mining techniques.
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
-
15
-
16
Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors
Published 2017“…Three were tested through the use of the PLS-SEM Algorithm and Bootstrapping techniques regarding their internal consistency reliability, convergent validity, discriminant validity, and direct relationships. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Pixel value differencing steganography techniques: Analysis and open challenge
Published 2015Get full text
Get full text
Conference or Workshop Item -
19
Enhancement of Groundwater-Level Prediction Using an Integrated Machine Learning Model Optimized by Whale Algorithm
Published 2023“…The radial basis function (RBF) neural network�whale algorithm (WA) model, the multilayer perception (MLP�WA) model, and genetic programming (GP) were used to predict GWL. …”
Article -
20
Mel Frequency Cepstral Coefficient (MFCC) extraction for speaker identification on FPGA
Published 2009Get full text
Working Paper
