Search Results - (( java segmentation using algorithm ) OR ( pattern affecting generation algorithm ))
Search alternatives:
- affecting generation »
- generation algorithm »
- java segmentation »
- pattern affecting »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
Get full text
Get full text
Citation Index Journal -
5
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
Get full text
Get full text
Citation Index Journal -
6
Frequent patterns minning of stock data using hybrid clustering association algorithm
Published 2009“…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement
Published 2013“…The predefined joint trajectories are generated using Matsuoka neural oscillator network as the central pattern generator of the quadruped. …”
Get full text
Get full text
Thesis -
8
Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom
Published 2018“…The second objective is the development of an alternative simulation approach using generative algorithm. A generative modeling tool using visual programming editor Grasshopper® which provides a more realistic simulation tool by incorporating the kinematic property of the origami was developed. …”
Get full text
Get full text
Thesis -
9
Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH
Published 2021“…The load flow patterns will significantly have affected when uncertain PV generation – load models are considered into the power flow algorithm. …”
Get full text
Get full text
Thesis -
10
Preserving the topology of self-organizing maps for data analysis: A review
Published 2020“…Misinterpretation of the training samples can lead to failure in identifying the important features that may affect the outcomes generated by the SOM model. This paper presents detail explanation on SOM learning algorithm and its applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…To survey in an unstructured landfill site environment is challenging and the quadcopter requires decisional autonomy capacities. The final algorithm proposed in this thesis, self-generates coordinates based only on the user input of three coordinate angles at the corner of the selected survey area, this makes it possible to cover an area of any dimensions. …”
Get full text
Get full text
Thesis -
12
A COMBINED HISTOGRAM OF ORIENTED GRADIENTS AND COMPLETED LOCAL BINARY PATTERN METHODS FOR PEOPLE COUNTING IN A DENSE CROWD SCENARIO
Published 2016“…This method used a collaborative Histogram of Oriented Gradients (HOG) and Completed Local Binary Pattern (CLBP) based on people detection algorithm to detect headshoulder region. …”
Get full text
Get full text
Thesis -
13
Techno-economic optimization and modelling of grid-connected photovoltaic and battery energy storage system
Published 2023“…In this thesis, MATLAB Simulink modeling toolbox is used for simulation of the solar PV-BESS design and verification of the MDRed modeling via variations in MD limit and solar PV generation load. Apart from that, the maximum demand supervisory control algorithm is developed via MATLAB Stateflow® for the battery management system (BMS) to monitor and regulate the load to maintain the net load consumption below MD limit with or without solar PV generation. …”
text::Thesis -
14
Optimized feature construction methods for data summarizations of relational data
Published 2014“…This thesis also presents the study of a method to improve the descriptive accuracy of DARA algorithm by generating multi-instances of summarized data. …”
Get full text
Get full text
Get full text
Thesis -
15
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Optimization is a crucial process to select the best parameters in single and multi-objective problems for manufacturing process.However,it is difficult to find an optimization algorithm that obtain the global optimum for every optimization problem.Artificial Bees Colony (ABC) is a well-known swarm intelligence algorithm in solving optimization problems.It has noticeably shown better performance compared to the state-of-art algorithms.This study proposes a novel hybrid ABC algorithm with β-Hill Climbing (βHC) technique (ABC-βHC) in order to enhance the exploitation and exploration process of the ABC in optimizing carbon nanotubes (CNTs) characteristics.CNTs are widely used in electronic and mechanical products due to its fascinating material with extraordinary mechanical,thermal,physical and electrical properties. …”
Get full text
Get full text
Get full text
Thesis -
16
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…PV system performance is highly impacted by partial shading conditions (PSCs), The shading affects the pattern of the power- voltage (P–V) characteristic curve to contain more than one power peak, which creates difficulties on extracting the maximum power point (MPP), and hence, the generated power will reduce. …”
Get full text
Get full text
Get full text
Thesis -
17
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…Distributed Generation (DG) has become one of the options in electrical power provision, in order to curtail or reduce the problems posed by the conventional power systems. …”
Get full text
Get full text
Thesis -
18
AN INTEGRATED TECHNIQUE IN ACHIEVING THE CONFIDENTIALITY, INTEGRITY AND ROBUSTNESS FOR BIG DATA TRANSMISSION
Published 2017“…Henceforth, this research addresses these security issues collectively without negatively affecting each other. It increases confidentiality and offers a backup for accidental data loss by combining Simplified Encryption Standard (SDES) and an advanced pattern generation technique which uses a unique pattern generation table. …”
Get full text
Get full text
Thesis -
19
Evolutionary-based feature construction with substitution for data summarization using DARA
Published 2012“…This is performed in order to exploit all possible interactions among attributes which involves an application of genetic algorithm to find a relevant set of features. The constructed features will be used to generate relevant patterns that characterize non-target records associated to the target record as an input representation for data summarization process. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
