Search Results - (( parallel optimization path algorithm ) OR ( process identification task algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Identification and Grading of Manage Using Image Processing by Shukor, Syazwan

    Published 2021
    “…This project has developed an image processing algorithm for a systematic maturity identification of "Mangga Susu Thai Gold" mangos. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Development of person identification application for video surveillance by Soon, Phaik Ching

    Published 2022
    “…After inserting the necessary images and videos, it is time for the back-end process. There are three important processes in this application, such as person detection, person tracking, and person identification. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Educational project on a simple voice identification using mel-frequency cepstrum coefficients and vector quantization by Akmeliawati, Rini, Widhiputranto, H. K.

    Published 2008
    “…The estimation fundamental frequency is performed with Harmonic Product Spectrum (HPS) algorithm, whilst MFCC is calculated using Discrete Cosine Transform, then, is modeled with Vector Quantization to compress the size of data to be processed and to assist identification.…”
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Classification of Citrus (Rutaceae) by Using Image Processing by Najwa Bari'ah Mohd Tabri

    Published 2019
    “…A machine learning algorithms, SVM have been used to build species identification models. …”
    Get full text
    Get full text
    Undergraduate Final Project Report
  15. 15

    Complex word identification model for lexical simplification in the Malay language for non-native speakers by Salehah, Omar

    Published 2023
    “…Lexical Simplification (LS), a method in TS, is the task of converting words into simpler words. Past studies have shown weaknesses in the LS first task, called Complex Word Identification (CWI), where simple and complex words have been misidentified in previous CWI model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Weighted Watson-crick automata and applications in halal authentication by Mohd Tamrin, Mohd Izzuddin, Turaev, Sherzod, Che Azemin, Mohd Zulfaezal

    Published 2016
    “…We also construct formal models for food authentication processes and develop algorithms for the identification of non halal patterns in DNA molecules. …”
    Get full text
    Get full text
    Monograph
  18. 18

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  19. 19

    Video image processing for traffic analysis by Che Puan, Othman

    Published 1992
    “…In recent years the application of computer-based image processing techniques to a range of traffic data collection tasks has been successfully demonstrated. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The proposed EBGWO algorithm can be used for FS in anomaly detection tasks that involve any dataset size from various application domains.…”
    Get full text
    Get full text
    Thesis