Search Results - (( java segmentation using algorithm ) OR ( program detection force algorithm ))
Search alternatives:
- java segmentation »
- program detection »
- using algorithm »
- detection force »
- force algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli
Published 2018“…Meanwhile, the strength of the gripping force is measured by comparing the result of motor position angle with the voltage from a force sensor attached at each of the robot finger tips. …”
Get full text
Get full text
Thesis -
6
A review of classification techniques for electromyography signals
Published 2023“…Electromyography (EMG) signals can be used in various sector such as medical, rehabilitation, robotics, and industrial fields.EMG measures muscle response or electrical activity in response to a nerve’s stimulation of the muscle. To detect neuromuscular abnormalities, these test is very useful.EMG can measures the electrical activity of muscle during rest, slight and forceful contraction. …”
Get full text
Get full text
Get full text
Article -
7
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…BCT allows collecting sensor user access data, whereas ML classifiers distinguish between normal and malicious behavior to detect attacks. DoS, DDoS, intrusion, a man in the middle (MitM), brute force, cross-site scripting (XSS), and searching are the attacks detected by BCT. …”
Get full text
Get full text
Article -
8
