Search Results - (( using location method algorithm ) OR ( basic (equalization OR visualization) based algorithm ))
Search alternatives:
- method algorithm »
- location method »
- using location »
-
1
Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators
Published 2023“…A method based on Electromagnetism-Like algorithm (EM) and Genetic Algorithm (GA) is proposed to determine the time-optimal task scheduling for dual robot manipulators. …”
Conference paper -
2
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
3
Optimization of the Time of Task Scheduling for Dual Manipulators using a Modified Electromagnetism-Like Algorithm and Genetic Algorithm
Published 2023“…A method based on a modified electromagnetism-like with two-direction local search algorithm (MEMTDLS) and genetic algorithm (GA) is proposed to determine the optimal time of task scheduling for dual-robot manipulators. …”
Article -
4
Review of wire-mesh tomography in different experiments
Published 2021“…This sensor can be used to gain void fraction distribution in multiphase flow visualization. …”
Get full text
Get full text
Get full text
Article -
5
Face Detection System / Chan Beh Teng
Published 2004“…The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
Get full text
Get full text
Thesis -
6
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). The efficacy evaluation of the prototype is based on pre- and post- test of the students’ programming performance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
8
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…The basic design of visual cryptography exploits the human visual system, to recover secret images. …”
Get full text
Get full text
Thesis -
9
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…A user friendly GUI is developed using VISUAL BASIC to interface the user commands with the Robot controller. …”
Get full text
Get full text
Monograph -
10
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
11
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…We demonstrate our framework; the integration of enhanced Jump Point Search algorithm with modified Bresenham for heuristic computation in virtual grid-based environment. …”
Get full text
Get full text
Get full text
Thesis -
12
A review on monocular tracking and mapping: from model-based to data-driven methods
Published 2022“…This article starts by introducing the basic sensor systems and analyzing the evolution of monocular tracking and mapping algorithms through bibliometric data. …”
Get full text
Get full text
Article -
13
Building a feature-space for visual surveillance
Published 2014“…The future of visual surveillance applications relies on the developments in the area of computer vision, human motion analysis and computer algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Scheduling of batch process plant / Aladin Awang Hamat
Published 1999“…For that reason, this research is done based on the development of scheduling, involving algorithm and hardware. …”
Get full text
Get full text
Thesis -
16
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…This paper presents an automatic visual inspection of exterior surface defects of oil tanks using unmanned aerial vehicles (UAVs) and image processing with two cascading fuzzy logic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…The basic structure of FACTS devices and their configuration is described. A heuristic method known as genetic algorithm is used to seek the optimum location and setting of these controllers where there are some works related to this case using various techniques. …”
Get full text
Get full text
Thesis -
20
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports
