Search Results - (( java implementation path algorithm ) OR ( knowledge segmentation based algorithm ))
Search alternatives:
- knowledge segmentation »
- java implementation »
- implementation path »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images
Published 2010“…A two-fold fuzzy segmentation algorithm based on Bayesian method is proposed in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
5
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
6
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
7
-
8
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021“…The single tree crown was obtained from the digital surface model by using four algorithms such as watershed segmentation, object based image analysis, inverse watershed segmentation and seed generation. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
A feature-based approach for segmenting faces
Published 2004“…We identify that the key factor in a generic and robust system is that of using a large amount of image evidence, related and reinforced by model knowledge through a probabilistic framework. In this paper, we propose a feature-based algorithm for segmenting faces that is sufficiently generic and is also easily extensible to cope with more demanding variations of the imaging conditions. …”
Get full text
Get full text
Article -
11
-
12
Coronary artery segmentation in angiograms with pattern recognition techniques - a survey
Published 2013“…But based on our knowledge, there is not any review paper to categorize and compare them together. …”
Get full text
Get full text
Conference or Workshop Item -
13
A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging
Published 2021“…We propose a new reinforced active learning strategy based on a deep reinforcement learning algorithm. …”
Get full text
Get full text
Article -
14
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
15
Effective predicate identification algorithm for XML retrieval
Published 2018Get full text
Get full text
Conference or Workshop Item -
16
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
Get full text
Get full text
Get full text
Thesis -
17
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
18
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
Published 2024Get full text
journal::journal article
