Search Results - (( java implementation path algorithm ) OR ( pattern identification method algorithm ))
Search alternatives:
- pattern identification »
- identification method »
- java implementation »
- implementation path »
- method algorithm »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…Pattern recognition approach based on Auto-Regressive (AR) algorithm is an alternative way to provide a more accurate defect identification from stress wave propagated along ASTM A179 heat exchanger tubes. …”
Get full text
Get full text
Get full text
Article -
6
EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN
Published 2019“…Besides, common spatial pattern (CSP) is the well-known method for classification algorithm in the BCI field. …”
Get full text
Get full text
Final Year Project -
7
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Many improvements methods were utilized to increase the speed and accuracy of the identification. …”
Get full text
Get full text
Thesis -
8
Finger Vein Recognition Using Pattern Map As Feature Extraction
Published 2012“…Experimental results show that the proposed pattern map algorithm has better performance with a consistent identification rate of 99% and above compared to existing methods such as PCA and Gabor with FVCode. …”
Get full text
Get full text
Thesis -
9
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
Get full text
Get full text
Monograph -
10
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…However, gait patterns can vary significantly between individuals, making it challenging to develop a generalized algorithm for identifying incline surface human activity. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Sistem Pengecaman Bentuk Berdasarkan FPGA
Published 2005“…Pattern recognition means that the definition, identification and the classification by deciding the characteristics of that pattern which is need to be known. …”
Get full text
Get full text
Monograph -
12
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
Get full text
Get full text
Get full text
Article -
13
-
14
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Sparse representation prevents over-fitting in the classifier by eliminating redundancies and evaluating high-frequency patterns between feature vectors. Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
15
Personal identification by Keystroke Pattern for login security
Published 2001Get full text
Get full text
Thesis -
16
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
18
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019Get full text
Get full text
Conference or Workshop Item -
19
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019Get full text
Get full text
Conference or Workshop Item -
20
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…This will allow the investigators to detect the data remnants and identify their patterns. The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis
