Search Results - (( parameter representation based algorithm ) OR ( java application system algorithm ))
Search alternatives:
- parameter representation »
- representation based »
- java application »
- system algorithm »
-
1
-
2
A new corner detection algorithm for chain code representation.
Published 2005Get full text
Get full text
Article -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
Switching algorithm to avoid attitude representation singularity
Published 2009“…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. The algorithm is numerically demonstrated and validated by several nonlinear six degree of freedom simulation tests.…”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…Based on the acquired results, the experiments reveal that the modified word vectors algorithm can effectively alter original LLM-generated word vectors to reflect intended contexts and can outperform baseline scores in contextual text classification tasks. …”
Get full text
Get full text
Thesis -
7
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
Get full text
Get full text
Thesis -
8
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
10
Logo recognition using Artificial Neural Network (ANN) / Nor Hamidah Abdul Ghafar
Published 2005“…The binary representation was used for the input node of neural network for back propagation training algorithm. …”
Get full text
Get full text
Student Project -
11
-
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
Time-Frequency Analysis of FSK Digital Modulation Signals using the Smooth Lag-Windowed Wigner-Ville Distribution.
Published 2003“…The algorithm generates the time-frequency representation directly based on the signal characteristics. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
Single parent mating in genetic algorithm for real robotic system identification
Published 2023“…System identification (SI) is a method of determining a mathematical model for a system given a set of input-output data. A representation is made using a mathematical model based on certain specified assumptions. …”
Get full text
Get full text
Get full text
Article -
17
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…The genetic algorithm technique is explained and the real number representation of genetic algorithm is modeled. …”
Get full text
Get full text
Thesis -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
19
Switching principles to circumvent Euler angle singularity
Published 2010“…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. The algorithm is numerically demonstrated and validated by a nonlinear six degree of freedom closed-loop spacecraft simulation test.…”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis
