Search Results - (( java application tree algorithm ) OR ( software identification based algorithm ))
Search alternatives:
- software identification »
- identification based »
- java application »
- application tree »
- tree algorithm »
-
1
-
2
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
4
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…In this case, the algorithm of the DIS operator is embedded with the Marker-based Watershed segmentation as the assistance of Marker-based Watershed Segmentation is effective in extracting the individual significant edges features produced by DIS operator. …”
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…Software quality is an important research area and has gain considerable attention from software engineering community in identification of priority quality attributes in software development process. …”
Get full text
Get full text
Get full text
Thesis -
6
Texture-based feature using multi-blocks gray level co-occurrence matrix for ethnicity identification
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…This paper investigates the identification of dynamic system in the form of NARX (Non-linear AutoRegressive with eXogenous input) model based on PMIC2 and AIC using GA. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
10
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…The configuration of 132/11kV from actual distribution system in Malaysia with 38 nodes is modelled using the PSCAD/EMTDC software. This work attempt to combine fault section identification with impedance based method in order to address non-homogeneity of cables in distribution system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…In conclusion, the finger vein identification hardware architecture based on KNCN classifier is successfully implemented on an FPGA board with faster processing time as compared with software-based implementation of KNCN classifier in MATLAB.…”
Get full text
Get full text
Thesis -
12
A multi-color based features from facial images for automatic ethnicity identification model
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
14
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
15
-
16
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
17
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
18
Comparative database search engine analysis on massive tandem mass spectra of pork-based food products for halal proteomics
Published 2021“…Mass spectrometry-based proteomics relies on dedicated software for peptide and protein identification. …”
Get full text
Get full text
Article -
19
Embedded system for biometric identification based on iris detection
Published 2009Get full text
Article -
20
Software-Defined Radio-Based Modulation and Demodulation Scheme
Published 2009Get full text
Get full text
Thesis
