Search Results - (( java implementation path algorithm ) OR ( pattern reading patterns algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- pattern reading »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…Industrial visual machine inspection system uses template or feature matching methods to locate or inspect parts or pattern on parts. These algorithms could not compensate for the change or variation on the inspected parts dynamically. …”
Get full text
Get full text
Thesis -
4
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017“…Through the analysis of the fault patterns and other algorithm, it was found that multiple read operation within a single MARCH element from MARCH-NU algorithm can aid in the identification of the Read Destructive Fault whereas having HOLD time in the MARCH 9N algorithm would expose the Data Retention Fault. …”
Get full text
Get full text
Thesis -
6
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
7
A feasibility study of using an Electronic Nose as a fruit ripeness measuring instrument
Published 2009Get full text
Working Paper -
8
MELODY TRAINING WITH SEGMENT-BASED TILT CONTOUR FOR QURANIC TARANNUM
Published 2021“…A tarannum training prototype is built to test similarity between a userâ��s recitation and the trained patterns. To identify similarity between a pair of verse-contours, the application employs a shape-based contour similarity algorithm. …”
Get full text
Get full text
Article -
9
Segmentation of Malay syllables in connected digit speech using statistical approach
Published 2008“…Patterns used in this experiment are connected digits of 11 speakers spoken in read mode in lab environment and spontaneous mode in classroom environment. …”
Get full text
Get full text
Get full text
Article -
10
An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing
Published 2014“…Out of five types of staining patterns nucleolar and centromere share similar visual appearance and the same is true to homogeneous, fine-speckled, coarse-speckled patterns. …”
Get full text
Get full text
Final Year Project -
11
An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals
Published 2024“…It was also identified that the frequently performed exploratory procedures among participants were contour following and lateral motions. However, their reading strategies were too random and lacked systematic patterns. …”
Get full text
Get full text
Get full text
Article -
12
Recent applications in quantitative methods and information technology
Published 2018“…The analyses in each chapter are explained in detail with samples of real applications in daily life to assist readers to appreciate theoretical, algorithm and mathematical formulations.Prior to reading this book, readers are advised to have some basic foundation in statistical sampling, tabu search approach, neural network, algorithms, and mathematical formulation. …”
Get full text
Get full text
Book -
13
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
Get full text
Get full text
Thesis -
14
Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems
Published 2025“…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
Get full text
Get full text
Get full text
Article -
15
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
Get full text
Get full text
Thesis -
16
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
Get full text
Get full text
Thesis -
17
Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network
Published 2012“…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
19
An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals
Published 2024“…It was also identified that the frequently performed exploratory procedures among participants were contour following and lateral motions. However, their reading strategies were too random and lacked systematic patterns. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems
Published 2025“…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
Get full text
Get full text
Get full text
Get full text
Article
