Search Results - (( java implementation during algorithm ) OR ( based classification path algorithm ))
Search alternatives:
- implementation during »
- based classification »
- java implementation »
- classification path »
- during algorithm »
- path algorithm »
-
1
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…ACO classification accuracy is compared to Genetic Algorithm classifier which also a wrapper method. …”
Get full text
Get full text
Thesis -
3
Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks
Published 2014“…This problem can best be modelled through fuzzy logic based classification that is based on continuous values. …”
Get full text
Get full text
Conference or Workshop Item -
4
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…The main motivation of this study is to find out techniques that may improve EEG signal classification. SAX algorithm may bring improvement to classic time series classification, so we investigate it`s impact on EEG signal classification. …”
Get full text
Thesis -
6
Implementation of machine learning algorithm in preventing network congestion
Published 2023text::Final Year Project -
7
Animal voice recognition for identification (ID) detection system
Published 2011“…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
Get full text
Get full text
Conference or Workshop Item -
8
Dog voice identification (ID) for detection system
Published 2012“…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
12
Comparison between Levenberg-Marquardt and scaled conjugate gradient training algorithms for ionosphere condition using Multilayer Perceptrons / Mohd Sharif Ibrahim
Published 2010“…Based on the result, there are concluded that both algorithms were comparable in terms of accuracy and speed. …”
Get full text
Get full text
Thesis -
13
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2017“…The result of R2 and RMSEC after variable selection for transflectance and transmission were improved significantly. Based on the result of classification and quantification analysis, the transmission mode has yield better prediction model compared to the transflectance mode to distinguish the pure and adulterated palm oil.…”
Get full text
Get full text
Get full text
Article -
14
Ant colony optimization for vehicle traffic systems: applications and challenges
Published 2014“…Thus, ant-based algorithms are now being adopted by vehicle traffic systems VTSs to guide vehicles to less congested paths. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
16
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2024“…The result of R2 and RMSEC after variable selection for transflectance and transmission were improved significantly. Based on the result of classification and quantification analysis, the transmission mode has yield better prediction model compared to the transflectance mode to distinguish the pure and adulterated palm oil.…”
Article -
17
Radar-based collision avoidance on Unmanned Surface Vehicles (USV)
Published 2022“…This information can help make an initial decision in the collision avoidance algorithm, as shown in this study. The classification of targets is performed based on radar plotting principle. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…The feature enhancement task is performed by applying the Path Aggregation Network (PANet) and Spatial Pyramid Pooling Network (SPPNet) algorithms, which are deployed to enhance the extracted and generated features. …”
Get full text
Get full text
Get full text
Article -
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
