Search Results - (( visualization implementation connection algorithm ) OR ( java implementation bat algorithm ))
Search alternatives:
- visualization implementation »
- implementation connection »
- connection algorithm »
- java implementation »
- implementation bat »
- bat algorithm »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…The current thesis is concerned with how biological systems solve the computational problem of visual pose estimation. Four levels of analysis are traversed in order of decreasing abstraction: computational, algorithmic, implementational and formational. …”
Get full text
Get full text
Thesis -
3
Visual servo algorithm of robot arm for pick and place application
Published 2024“…First, an object recognition algorithm is implemented to identify the object to be grasped. …”
Get full text
Get full text
Get full text
Article -
4
Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan
Published 2020“…In the nut shell, a discussion on how the system should responding to the limitations such as implementing collaborative filtering algorithm and adding some features in order to enhance the efficiency of the system is also mentioned.…”
Get full text
Get full text
Thesis -
5
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection.…”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Dual authentication for bluetooth connection
Published 2014“…Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection.…”
Get full text
Get full text
Get full text
Article -
7
-
8
Exploratory study of Kohonen network for human health state classification
Published 2018Get full text
Get full text
Article -
9
Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics
Published 2023“…This analysis involved the implementation of machine learning (ML) algorithms, including decision trees, random forests, and stacking, to classify soybean FLS severity levels. …”
Get full text
Get full text
Article -
10
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Fast clock tree generation using exact zero skew clock routing algorithm
Published 2009“…A few Perl scripts and a new visual basic based routing tool have been developed to support the methodology implementation. …”
Get full text
Get full text
Get full text
Article -
12
Lung segmentation in CT for thoracic PET-CT registration through visual study
Published 2012“…Lungs segmentation in CT image is implemented based on optimal thresholding, region growing, connected component labeling as well as morphological operations. …”
Get full text
Get full text
Conference or Workshop Item -
13
Real time vein visualization using near-infrared imaging
Published 2020“…Although the concept behind the technique is not complicated, the vein pattern acquisition method and the design and implementation of image processing algorithms become challenging. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…Results of segmentation have been validated by a group of neuro-radiologists. 3D visualization has been implemented for the segmented regions as well as brain lesion. …”
Get full text
Get full text
Thesis -
15
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…After applying the denoising algorithm on the contaminated image, the cycling spinning algorithm is applied to increase the visual quality of the restored image. …”
Get full text
Get full text
Thesis -
16
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…, and that name is chosen because it is like Unix but differs from Unix because it is free and contains no Unix code. Those algorithms were implemented using 300 randomly generated problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Moving detection using cellular neural network (CNN)
Published 2008“…The main idea in Cellular Neural Network is that connection is allowed between adjacent units only. This paper comprises the implementation of the basic templates available in Cellular Neural Network. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization / Mohd Norhisham Razali ... [et al.]
Published 2023“…Attributes such as "Department," "Actual Productive hours," "Internet Speed," and "COVID-19 adoption month" emerged as highly influential factors across multiple ranking techniques. The data visualization provided valuable insights into various aspects of employee performance, such as productivity trends before and after the pandemic, departmental performance, internet connectivity's impact on productivity, age-related trends, overtime distribution, and promotion rates. …”
Get full text
Get full text
Article -
19
Design and data analysis for a belt-for-blind for visual impaired people
Published 2011Get full text
Get full text
Article -
20
Anomaly detection in network traffic using machine learning
Published 2026Get full text
Get full text
Get full text
Article
