Search Results - intelligence based ((((coding algorithm) OR (model algorithm))) OR (matching algorithm))
Search alternatives:
- intelligence based »
- coding algorithm »
- model algorithm »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…For comparison purposes, the template matching based OCR will be compared to Artificial Neural Network (ANN) based OCR. …”
Get full text
Get full text
Get full text
Book -
2
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
Get full text
Get full text
Thesis -
3
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Motion estimation in video compression process is computationally intensive for video encoder that involve a large percentage of processing time. Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
Get full text
Get full text
Thesis -
4
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
5
-
6
An Intelligent Voltage Controller for a PV Inverter System Using Simulated Annealing Algorithm-Based PI Tuning Approach
Published 2017“…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
-
10
Artificial immune network model based controller for vibration suppression of flexible structures
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
11
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
Get full text
Get full text
Get full text
Article -
12
An intelligent voltage controller for a PV inverter system using simulated annealing algorithm-based PI tuning approach
Published 2023“…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
Article -
13
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. This is achieved by integrating deep learning and artificial intelligence technologies. …”
Get full text
Get full text
Get full text
Article -
14
Recent advances of whale optimization algorithm, its versions and applications
Published 2024“…One of the SI algorithms is called the whale optimization algorithm (WOA). …”
Book chapter -
15
-
16
An advanced scheme based on Artificial Intelligence technique for solving nonlinear Riccati systems
Published 2024“…Recently, one artificial intelligence technique, known as artificial neural network (ANN), has brought advanced development to the arena of mathematical research. …”
Get full text
Get full text
Article -
17
Model-Based Design (MBD) for autonomous underwater vehicle
Published 2019Get full text
Get full text
Get full text
Article -
18
-
19
-
20
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
text::Thesis
