Search Results - (( parallel optimization path algorithm ) OR ( process identification task algorithm ))
Search alternatives:
- process identification »
- parallel optimization »
- identification task »
- optimization path »
- path algorithm »
- task algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
5
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
-
8
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…Recently, several studies showed that the brain electrical activity or electroencephalogram (EEG) signals provide unique features that can be considered as user identification techniques. But, it is a challenging task where there are three important things must be addressed carefully in any EEG-based person identification. …”
Get full text
Get full text
Thesis -
9
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
10
Identification and Grading of Manage Using Image Processing
Published 2021“…This project has developed an image processing algorithm for a systematic maturity identification of "Mangga Susu Thai Gold" mangos. …”
Get full text
Get full text
Final Year Project -
11
Development of person identification application for video surveillance
Published 2022“…After inserting the necessary images and videos, it is time for the back-end process. There are three important processes in this application, such as person detection, person tracking, and person identification. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
Educational project on a simple voice identification using mel-frequency cepstrum coefficients and vector quantization
Published 2008“…The estimation fundamental frequency is performed with Harmonic Product Spectrum (HPS) algorithm, whilst MFCC is calculated using Discrete Cosine Transform, then, is modeled with Vector Quantization to compress the size of data to be processed and to assist identification.…”
Get full text
Get full text
Proceeding Paper -
14
Classification of Citrus (Rutaceae) by Using Image Processing
Published 2019“…A machine learning algorithms, SVM have been used to build species identification models. …”
Get full text
Get full text
Undergraduate Final Project Report -
15
Complex word identification model for lexical simplification in the Malay language for non-native speakers
Published 2023“…Lexical Simplification (LS), a method in TS, is the task of converting words into simpler words. Past studies have shown weaknesses in the LS first task, called Complex Word Identification (CWI), where simple and complex words have been misidentified in previous CWI model. …”
Get full text
Get full text
Get full text
Thesis -
16
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2023Conference Paper -
17
Weighted Watson-crick automata and applications in halal authentication
Published 2016“…We also construct formal models for food authentication processes and develop algorithms for the identification of non halal patterns in DNA molecules. …”
Get full text
Get full text
Monograph -
18
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
19
Video image processing for traffic analysis
Published 1992“…In recent years the application of computer-based image processing techniques to a range of traffic data collection tasks has been successfully demonstrated. …”
Get full text
Get full text
Get full text
Article -
20
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The proposed EBGWO algorithm can be used for FS in anomaly detection tasks that involve any dataset size from various application domains.…”
Get full text
Get full text
Thesis
