Search Results - (( image classification path algorithm ) OR ( java application model algorithm ))
Search alternatives:
- image classification »
- classification path »
- application model »
- java application »
- model algorithm »
- path algorithm »
-
1
Implementation of vision-assisted path planning system for bulk die sorting in semiconductor industry
Published 2018“…Subsequently, point and coverage path planning algorithms are applied to determine the optimum path for physical die sorting operation. …”
Get full text
Get full text
Conference or Workshop Item -
2
Implementation of vision-assisted path planning system for bulk die sorting in semiconductor industry
Published 2018“…Subsequently, point and coverage path planning algorithms are applied to determine the optimum path for physical die sorting operation. …”
Get full text
Get full text
Conference or Workshop Item -
3
Developing and validating a simulation model for counting and classification of vehicles
Published 2016“…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…Finally, the results were compared with the existing proposed Flower Pollination Algorithm (FPA) at the time of FCC extraction. The results show that WOA is a bit better at getting shorter path lengths than FPA in terms of path lengths. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The proposed vegetation encroachment detection framework used the state-of-art RetinaNet model to identify and locate the power transmission towers from satellite images. A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
13
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Parallel imaging is a robust method for accelerating the data acquisition in Magnetic Resonance Imaging (MRI). …”
Get full text
Get full text
Get full text
Thesis -
14
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
15
-
16
-
17
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
20
Oil Palm Yield Data Collection Using Image Processing
Published 2021“…Autonomous drone also plays a big role in this system as it helps in capturing the images from the oil palm plantation. This area involves techniques such as path finding and stabilising in order to control the drone. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
