Search Results - (( java implementation path algorithm ) OR ( automatic identification system algorithm ))
Search alternatives:
- identification system »
- java implementation »
- implementation path »
- system algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
System Identification And Control Of Automatic Car Pedal Pressing System For Low-Speed Driving In A Road Traffic Delay
Published 2022“…This project presents system identification and control of automatic car pedal pressing system for low-speed driving in a road traffic delay. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
6
Smart Cards And The Fingerprint : A Proposed Framework For The Automatic Teller Machine (ATM) System
Published 2002“…As a result, the research proposed a framework for user identification and authentication in automatic teller machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards. …”
Get full text
Get full text
Get full text
Thesis -
7
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…Radial basis function network (RBF) based on system identification can be utilised as an alternative technique for quadcopter modelling. …”
Get full text
Get full text
Article -
8
-
9
Automatic identification of epileptic seizures from EEG signals using sparse representation-based classification
Published 2020“…In this research, a fully automated system is presented to automatically detect the various states of the epileptic seizure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Online fingerprint recognition
Published 2010“…The systems are increasingly employed into business, trading and living fields for automatic personal identification. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Analysis of minutia extraction techniques in fingerprint recognition.
Published 2012Get full text
Working Paper -
13
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…Radial basis function network (RBF) based on system identification can be utilised as an alternative technique for quadcopter modelling. …”
Get full text
Get full text
Article -
14
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This algorithm is used to estimate the maximum loadability point in power system. …”
Get full text
Get full text
Thesis -
15
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Fuzzy modelling for distillation column
Published 2005“…This paper presents a hybrid method to tune the parameters of TS fuzzy system automatically using Genetic Algorithms (GA) and Recursive Least Square (RLS) technique. …”
Get full text
Conference or Workshop Item -
17
Automatic clustering of generalized regression neural network by similarity index based fuzzy c-means clustering
Published 2004“…We applied the technique for system identification and modeling and found the results to be encouraging and efficient. …”
Get full text
Get full text
Get full text
Article -
18
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Fingerprint feature extraction based discrete cosine transformation (DCT)
Published 2009“…Fingerprint identification and verification are one of the most significant and reliable identification methods. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article
