Search Results - (( java segmentation using algorithm ) OR ( program detection force algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4
  5. 5

    Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli by Remeli, Nurul Hanani

    Published 2018
    “…Meanwhile, the strength of the gripping force is measured by comparing the result of motor position angle with the voltage from a force sensor attached at each of the robot finger tips. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A review of classification techniques for electromyography signals by Mohd Saad, Norhashimah, Omar, Siti Nashayu, Abdullah, Abdul Rahim, Shair, Ezreen Farina, H.Rashid

    Published 2023
    “…Electromyography (EMG) signals can be used in various sector such as medical, rehabilitation, robotics, and industrial fields.EMG measures muscle response or electrical activity in response to a nerve’s stimulation of the muscle. To detect neuromuscular abnormalities, these test is very useful.EMG can measures the electrical activity of muscle during rest, slight and forceful contraction. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Multistage quality control in manufacturing process using blockchain with machine learning technique by Gu, J., Zhao, L., Yue, X., Arshad, N.I., Mohamad, U.H.

    Published 2023
    “…BCT allows collecting sensor user access data, whereas ML classifiers distinguish between normal and malicious behavior to detect attacks. DoS, DDoS, intrusion, a man in the middle (MitM), brute force, cross-site scripting (XSS), and searching are the attacks detected by BCT. …”
    Get full text
    Get full text
    Article
  8. 8