Search Results - (( java applications sensor algorithm ) OR ( parameter representation using algorithm ))
Search alternatives:
- parameter representation »
- representation using »
- applications sensor »
- java applications »
- sensor algorithm »
- using algorithm »
-
1
A new corner detection algorithm for chain code representation.
Published 2005Get full text
Get full text
Article -
2
Switching algorithm to avoid attitude representation singularity
Published 2009“…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…For each proposed soft computing technique, parameter tuning is done as an essential study. The sum of squares error (SSE) is used as an objective function. …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
5
Logo recognition using Artificial Neural Network (ANN) / Nor Hamidah Abdul Ghafar
Published 2005“…The binary representation was used for the input node of neural network for back propagation training algorithm. …”
Get full text
Get full text
Student Project -
6
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
7
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…To bridge this gap, a five-phase research methodology is structured to propose and evaluate an algorithm enabling the external modification of LLM-generated word vectors using scalar values as the focus weightage. …”
Get full text
Get full text
Thesis -
8
Surface Moisture Content Retrieval from Visible/Thermal Infrared Images and Field Measurements
Published 2013“…Moisture content parameters were calculated, and then the moisture content algorithm was generated accordingly for the two study locations with three different “Split-window” algorithms and finally a spatial validation of satellite θ algorithms was conducted for accuracy assessment. …”
Get full text
Get full text
Article -
9
Time-Frequency Analysis of FSK Digital Modulation Signals using the Smooth Lag-Windowed Wigner-Ville Distribution.
Published 2003“…The algorithm generates the time-frequency representation directly based on the signal characteristics. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
11
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
12
Switching principles to circumvent Euler angle singularity
Published 2010“…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Single parent mating in genetic algorithm for real robotic system identification
Published 2023“…As a popular search method, genetic algorithm (GA) is used for selecting a model structure. …”
Get full text
Get full text
Get full text
Article -
14
Learning representations of network traffic using deep neural networks for network anomaly detection: A perspective towards oil and gas it infrastructures
Published 2020“…A total of sixty anomaly detectors were trained by authors using twelve conventional Machine Learning algorithms to compare the performance of aforementioned deep representations with that of a human-engineered handcrafted network data representation. …”
Get full text
Get full text
Article -
15
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…The genetic algorithm technique is explained and the real number representation of genetic algorithm is modeled. …”
Get full text
Get full text
Thesis -
16
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…The evolutionary algorithm has been extensively used to solve a range of combinatorial optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
Nonlinear auto-regressive model structure selection using binary particle swarm optimization algorithm / Ahmad Ihsan Mohd Yassin
Published 2014“…The NARMAX model and its derivatives (Nonlinear Auto-Regressive with Exogenous Inputs (NARX) and Nonlinear Auto-Regressive Moving Average (NARMA)) are powerful, efficient and unified representations of a variety of nonlinear models. The identification process of NARX/NARMA/NARMAX involves structure selection and parameter estimation, which can be simultaneously performed using the widely accepted Orthogonal Least Squares (OLS) algorithm.…”
Get full text
Get full text
Book Section -
20
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…There is lack of standardized scalar multiplication algorithm or parameter set to ensure compatibility and interoperability in cryptographic implementations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
