Search Results - (( solution segmentation means algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    Initialization Methods For Conventional Fuzzy C-Means And Its Application Towards Colour Image Segmentation by Tan , Khang Siang

    Published 2011
    “…Due to its capability in providing a particularly promising solution to clustering problems, the conventional Fuzzy C-Mean (FCM) algorithm is widely used as a segmentation method. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Optic cup and optic disc segmentation using improved selfish gene algorithm / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2016
    “…In addition, this new algorithm is compared to color channel multi-thresholding segmentation and artificial intelligence segmentation based clustering method such as Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy cMeans (FCM). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Dynamic Economic Dispatch For Power System by Hussein, Saif Tahseen

    Published 2016
    “…The solution algorithm based on a constraint relaxation and period-by-period is developed and tested. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A NOVEL FORWARD BACKWARD LINEAR PREDICTION ALGORITHM FOR SHORT TERM POWER LOAD FORECAST by BAHARUDIN, ZUHAIRI

    Published 2010
    “…The proposed AR-based algorithm divides long data record into short segments and searches for the AR coefficients that simultaneously model the data with the least means squared errors. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…From this point the Artificial Neural Networks (ANN) based solution approach was verified for the inverse kinematics solution. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Ismail, Mohd Norasri

    Published 2019
    “…The EnVADE algorithm uses selective mechanism. Selective mechanism means the video segmented into scenes and adaptation process is done based on the selected scenes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Abd Rahim, Mohd Hilmi Izwan

    Published 2019
    “…The EnVADE algorithm uses selective mechanism. Selective mechanism means the video segmented into scenes and adaptation process is done based on the selected scenes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Data stream clustering by divide and conquer approach based on vector model by Khalilian, Madjid, Mustapha, Norwati, Sulaiman, Nasir

    Published 2016
    “…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. However, there are some issues that are overlooked by the previous works in proposing data stream clustering solutions; (1) clustering dataset including big segments of repetitive data, (2) monitoring clustering structure for ordinal data streams and (3) determining important parameters such as k number of exact clusters in stream of data. …”
    Get full text
    Get full text
    Article
  15. 15

    Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation by Mahdavipour, Zeinab

    Published 2016
    “…The classification combines the analysis of defect intensity features, the application of unsupervised k-mean clustering and multi-class SVM algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A headway and order scheme based mixed integer goal programming model for railway rescheduling / Zuraida Alwadood by Alwadood, Zuraida

    Published 2017
    “…The model is solved by means of preemptive goal programming technique, using MATLAB r2014a, which automatically generates the optimal solution to the problem. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Low-distortion MMSE speech enhancement estimator based on laplacian prior by Mahmmod, Basheera M., Ramli, Abd Rahman, Abdulhussain, Sadiq H., Syed Mohamed, Syed Abdul Rahman Al-Haddad, A. Jassim, Wissam

    Published 2017
    “…The most well-known conventional speech enhancement algorithms introduce unwanted artifact noise and speech distortion to the enhanced signal. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…Motivated by this issue, we propose Signcryption Obfuscatable and Steganography-PadSteg (SOS) algorithm as a solution. Having Signcryption (digital signature and encryption) at each node is the baseline of security but the caveat is that the computational power of these components means both mechanisms will not be of highest security level hence the need to protect the information as it travels for a final process of obfuscation. …”
    Get full text
    Get full text
    Thesis
  20. 20