Search Results - (( solution segmentation means algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- solution segmentation »
- segmentation means »
- application sensor »
- java application »
- sensor algorithm »
- means algorithm »
-
1
Initialization Methods For Conventional Fuzzy C-Means And Its Application Towards Colour Image Segmentation
Published 2011“…Due to its capability in providing a particularly promising solution to clustering problems, the conventional Fuzzy C-Mean (FCM) algorithm is widely used as a segmentation method. …”
Get full text
Get full text
Thesis -
2
-
3
Optic cup and optic disc segmentation using improved selfish gene algorithm / Norharyati Md Ariff
Published 2016“…In addition, this new algorithm is compared to color channel multi-thresholding segmentation and artificial intelligence segmentation based clustering method such as Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy cMeans (FCM). …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
5
Dynamic Economic Dispatch For Power System
Published 2016“…The solution algorithm based on a constraint relaxation and period-by-period is developed and tested. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A NOVEL FORWARD BACKWARD LINEAR PREDICTION ALGORITHM FOR SHORT TERM POWER LOAD FORECAST
Published 2010“…The proposed AR-based algorithm divides long data record into short segments and searches for the AR coefficients that simultaneously model the data with the least means squared errors. …”
Get full text
Get full text
Thesis -
7
An Intelligent System Approach to the Dynamic Hybrid Robot Control
Published 1996“…From this point the Artificial Neural Networks (ANN) based solution approach was verified for the inverse kinematics solution. …”
Get full text
Get full text
Thesis -
8
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
9
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…The EnVADE algorithm uses selective mechanism. Selective mechanism means the video segmented into scenes and adaptation process is done based on the selected scenes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…The EnVADE algorithm uses selective mechanism. Selective mechanism means the video segmented into scenes and adaptation process is done based on the selected scenes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
Get full text
Get full text
Thesis -
13
-
14
Data stream clustering by divide and conquer approach based on vector model
Published 2016“…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. However, there are some issues that are overlooked by the previous works in proposing data stream clustering solutions; (1) clustering dataset including big segments of repetitive data, (2) monitoring clustering structure for ordinal data streams and (3) determining important parameters such as k number of exact clusters in stream of data. …”
Get full text
Get full text
Article -
15
Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation
Published 2016“…The classification combines the analysis of defect intensity features, the application of unsupervised k-mean clustering and multi-class SVM algorithms. …”
Get full text
Get full text
Thesis -
16
A headway and order scheme based mixed integer goal programming model for railway rescheduling / Zuraida Alwadood
Published 2017“…The model is solved by means of preemptive goal programming technique, using MATLAB r2014a, which automatically generates the optimal solution to the problem. …”
Get full text
Get full text
Thesis -
17
Low-distortion MMSE speech enhancement estimator based on laplacian prior
Published 2017“…The most well-known conventional speech enhancement algorithms introduce unwanted artifact noise and speech distortion to the enhanced signal. …”
Get full text
Get full text
Get full text
Article -
18
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…Motivated by this issue, we propose Signcryption Obfuscatable and Steganography-PadSteg (SOS) algorithm as a solution. Having Signcryption (digital signature and encryption) at each node is the baseline of security but the caveat is that the computational power of these components means both mechanisms will not be of highest security level hence the need to protect the information as it travels for a final process of obfuscation. …”
Get full text
Get full text
Thesis -
20
Modelling methods and structure topology of the switched reluctance synchronous motor type machine: A review
Published 2023“…However, the SRSM has several flaws, including low mean torque, low torque density and excessive torque ripples. …”
Get full text
Get full text
Get full text
Get full text
Article
