Search Results - (( modification implementation case algorithm ) OR ( java segmentation using algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…In order to verify the suitability and necessity for implementing the modification to the existing algorithms, eigenvalue analyses on a finite element model of a beam-like structure model were carried out and the eigenvectors for different cases were obtained. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…Design/methodology/approach: The genetic algorithm methodology implements a genetic algorithm that is augmented by application specific heuristics in order to guide the search for an optimal solution. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Despite the general success of this algorithm, there are several drawbacks and limitations which some of them are the existence of local minima, slow rates of convergence and some of the modification of BP algorithm requires complex and costly calculations at each iteration, which offset their faster rates of convergence. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Multi-state PSO GSA for solving discrete combinatorial optimization problems by Ismail, Ibrahim

    Published 2016
    “…The multistate model is then implemented in PSO and GSA. As a consequence, multi-state particle swarm optimization (MSPSO) and multi-state gravitational search algorithm (MSGSA) are developed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…Several works proposed different modifications on P&O algorithm to handle the main drawbacks, in addition to combine the P&O algorithm with a soft computing algorithm to track global peak under PSC, which is known as the hybrid approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A word stemming algorithm for Hausa language by Muazzam, Bashir, Azilawati, Rozaimee, Wan Malini, Wan Isa

    Published 2015
    “…The proposed method is a modification of Porter’s algorithm to fit Hausa morphological rules. …”
    Get full text
    Get full text
    Article
  11. 11

    New Quasi-Newton Equation And Method Via Higher Order Tensor Models by Gholilou, Fahimeh Biglari

    Published 2010
    “…The new method yields a more efficient algorithm compared to the standard limited memory BFGS with simple bounds (L-BFGS-B) method in the case of solving unconstrained problems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60 by Ngui,, Lin Hui.

    Published 2009
    “…These algorithms are often tested and applied on PC. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem, Hayder Natiq, Ahmad Zukarnain, Zuriati, Mohamed, Othman, Subramaniam, Shamala

    Published 2010
    “…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
    Get full text
    Get full text
    Article
  14. 14

    Solving fractional differential equations using fractional explicit method by Yip, Lian Yiung, Zanariah Abdul Majid

    Published 2024
    “…The main goal of this research is to derive FEM by considering the implementation of second-order Adam-Bashforth method using Lagrange interpolation for fractional case. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Solving fractional differential equations using fractional explicit method by Yiung, Yip Lian, Abdul Majid, Zanariah

    Published 2024
    “…The main goal of this research is to derive FEM by considering the implementation of second-order Adam-Bashforth method using Lagrange interpolation for fractional case. …”
    Get full text
    Get full text
    Article
  16. 16

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Towards large scale unconstrained optimization by Abu Hassan, Malik

    Published 2007
    “…Therefore in dealing with large scale unconstrained problems with a large number of variables, modifications must be made to the standard implementation of the many existing algorithms for the small scale case. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  18. 18

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…Moreover, the algorithm can provide a graded confidence that indicates the reliability of the classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking by Ong, Chor Keat

    Published 2017
    “…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis