Search Results - (( using template learning algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…However, present complex algorithms which are accurate require high processing power using a large size of learning dataset without labelling error. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Spatio-temporal event association using reward-modulated spike-time-dependent plasticity by Yusoff, Nooraini, Ibrahim, Mohammed Fadhil

    Published 2018
    “…The results demonstrate that the algorithm can also learn temporal sequence detection.Learning has also been tested in face-voice association using real biometric data.The loose dependency between the model's anatomical properties and functionalities could offer a wide range of applications, especially in complex learning environments.…”
    Get full text
    Get full text
    Article
  5. 5

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir by Amir, Nur Hazirah

    Published 2019
    “…It implemented Supervised Learning algorithm with Bayes’ Theorem model for the calculation of mood prediction using Python programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Face recognition for remote database backup system by Mohamed Din, Aniza, Ahmad, Faudziah, Mohamad Mohsin, Mohamad Farhan, Ku-Mahamud, Ku Ruhana, Theab, Mustafa Muwafak

    Published 2011
    “…Face recognition is one of the most interesting applications in the image processing field.To build a model to recognize the face of different people, we need to do several processes on the image to obtain the most efficient features.In this research a face recognition model is developed.The dataset used is of different face images. Neural Networks technique, specifically Multilayer Perceptron (MLP) model with Back-Propagation learning algorithm and Template Matching approach are implemented in model developed.The face recognition model developed is then applied on a remote database backup system.Template matching approach is found to give a higher percentage of matching accuracy and a faster result can be obtained compared to MLP as no learning process is required…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…Industrial visual machine inspection system uses template or feature matching methods to locate or inspect parts or pattern on parts. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Affect classification using genetic-optimized ensembles of fuzzy ARTMAPs by Liew, W.S., Seera, M., Loo, C.K., Lim, E.

    Published 2015
    “…Speciation was implemented using subset selection of classification data attributes, as well as using an island model genetic algorithms method. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Real Time Tracking and Face Recognition Using Web Camera by Thirunavakkarasu, Punithavathi

    Published 2005
    “…A tracking system is developed to work together with the face recognition algorithm. A method using pixel difference is used to detect movements in the camera's view. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2022
    “…Researchers have worked on ideas to improve exploration capability to prevent premature convergence by trying prediction operators, opposition-based learning, and different iteration strategies. There were also attempts to hybridize SKF with other famous algorithms such as Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Sine Cosine Algorithm (SCA) to improve its performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Anomaly detection for vision-based inspection by Chew, Yan Zhe

    Published 2022
    “…Tests were conducted on the MVTec Anomaly Detection dataset, which is a dataset for benchmarking anomaly detection methods with a focus on industrial inspection. The algorithms that were used for the conventional approach are Template Matching, Structural Similarity Index, Scale Invariant Feature-Transform and Oriented FAST and Rotated BRIEF, whereas the deep learning models that were used for the modern approach are Patch Distribution Modelling (PaDiM) and PatchCore. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
    Get full text
    Get full text
    Article
  20. 20

    Automated detection of microaneurysm for fundus images by Norhasmira, Mohammad, Zaid, Omar, Eko, Supriyanto, Alexander, Dietzel, Jens, Haueisen

    Published 2016
    “…It is then segmented out by using certain threshold value. In template learning, wavelet coefficient is used in separating the pattern and background image by following the Gaussian distribution curve. …”
    Get full text
    Get full text
    Get full text
    Proceeding