Search Results - (( java segmentation using algorithm ) OR ( policy implementation challenges algorithm ))
Search alternatives:
- policy implementation »
- challenges algorithm »
- java segmentation »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Multi-population kidney-inspired algorithm with migration policy selections for feature selection problems
Published 2025“…The initial algorithm, coded as MultiPop-KA, implements a predetermined migration policy. …”
Get full text
Get full text
Get full text
Article -
5
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025“…Four different workload scenarios were tested, and the performance of the three algorithms was compared against the data centre’s baseline VM allocation policy. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation
Published 2019“…In addition, two different optimization algorithms, namely crow search algorithm and master–slave algorithm, have been introduced to generate an optimal rule for water release policy. …”
Get full text
Get full text
Article -
7
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
Published 2018“…The performance analysis of the proposed algorithm ensures its effectiveness in reducing the WER and cost overheads as compared to the conventional LRU technique implemented on SRAM cells.…”
Get full text
Get full text
Get full text
Get full text
Article -
8
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…The mammogram database's initial test segment is critical for evaluating performance and determining the Area Under the Curve (AUC) to alias with medical policy. In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Ethical considerations for equitable outcome-based education in the Metaverse: a qualitative study
Published 2025“…Semi-structured interviews were conducted with 11 XR experts across education, design, and policy domains. Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. …”
Get full text
Get full text
Get full text
Article -
10
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
Published 2017“…The performance analysis of the proposed algorithm ensures its effectiveness in reducing the error rate and cost overheads as compared to the conventional LRU technique implemented on SRAM cells.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
-
13
Existence and uniqueness for the evolutionary impulse control problem using an asynchronous algorithms
Published 2025“…Ensuring both the existence and uniqueness of optimal control policies in such settings is paramount for practical implementation and theoretical understanding. …”
Article -
14
Ethical considerations for equitable outcome-based education in the metaverse: a qualitative study
Published 2025“…Semi-structured interviews were conducted with 11 XR experts across education, design, and policy domains. Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. …”
Get full text
Get full text
Get full text
Article -
15
Comparison of PPO and SAC Algorithms towards decision making strategies for collision avoidance among multiple autonomous vehicles
Published 2021“…In order to address this challenge, a simulation was implemented in the Unity3D game engine and two state-of-the-art RL algorithms PPO (Proximal Policy Optimization) and SAC (Soft Actor-Critic) were trained by an agent using Unity ML-Agents Toolkit. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Solving a multi-period inventory routing problem with stochastic unstationary demand rates
Published 2022“…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Solving a multiperiod inv entory routing problem with stochastic unstationary demand rates
Published 2022“…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Deep Reinforcement Learning For Control
Published 2021“…To generate the visual simulation in the simulator, the Python programming language is employed. The improved algorithm will help encourage the real-world implementation of DRL in many autonomous driving applications.…”
Get full text
Get full text
Monograph -
19
Legal Innovation in Religious Courts: The Potential Utilization of Artificial Intelligence (AI) in Resolving Contemporary Cases.
Published 2024“…Additionally, AI can potentially improve the efficiency of dispute mediation through digital platforms and facilitate automated inheritance calculations in line with Islamic law. However, implementing AI presents challenges, including inadequate regulations, potential algorithmic bias, and compatibility with Islamic legal values. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Flow-based approach on bro intrusion detection
Published 2017“…Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. …”
Get full text
Get full text
Get full text
Article
