Search Results - (( java segmentation using algorithm ) OR ( program monitoring force algorithm ))
Search alternatives:
- program monitoring »
- java segmentation »
- monitoring force »
- using algorithm »
- force algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
5
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
6
Development of a sensor device algorithm and monitoring system for the pin-on-disc (POD) tribometer
Published 2024text::Final Year Project -
7
Analyzing surface settlement factors in single and twin tunnels : A review study
Published 2024“…Practical implications for practicing engineers include thorough site investigations, risk assessments and comprehensive monitoring programs. Leveraging historical data and ML algorithms can enhance SS prediction accuracy and aid in proactive risk management. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. Computational strategies for the shape change consist of two stages: the derivation of incremental equilibrium equations and optimization of the cables forced elongation by sequential quadratic programming. …”
Get full text
Get full text
Thesis -
9
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…To this goal, a variety of machine learning algorithms are being studied. Data protection and monitoring is also another concern that is a critical component of the organization. …”
Get full text
Get full text
Article
