Search Results - (( model detection path algorithm ) OR ( based instruction ((cell algorithm) OR (_ algorithm)) ))
Search alternatives:
- model detection »
- detection path »
- path algorithm »
- cell algorithm »
-
1
Design of DNA sequence alignment accelerated system using 2-dimensional array and custom instruction on FPGA / Nur Dalilah Ahmad Sabri
Published 2018“…Thus, this research concentrates on the optimization techniques based on Custom Instruction (CI) and Rectangular Dimensional array (2D) that proposed on Smith-Waterman (SW) algorithm. …”
Get full text
Get full text
Thesis -
2
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
Get full text
Get full text
Get full text
Thesis -
3
Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion
Published 2020“…A new algorithm, called Laser Simulator, has been introduced to detect various entities in a road roundabout setting, which is later integrated with fuzzy logic algorithm for making the right decision about the existence of the roundabout. …”
Get full text
Get full text
Get full text
Article -
4
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
6
Test case minimization applying firefly algorithm
Published 2018“…The proposed test case minimization method has the following steps: provide weight to the paths, calculate path coverage for each path, transform an immediate graph into an adjacency matrix, which later is used to apply firefly algorithm and generate optimal test cases. …”
Get full text
Get full text
Get full text
Article -
7
-
8
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…Moreover, Cross-Stage Partial (CSP) DarkNet53 is used to improve the feature extraction and to facilitate the model’s object detection ability. A data augmentation algorithm is used for feature generation to enhance the model’s training robustness. …”
Get full text
Get full text
Get full text
Article -
9
Development of a State-Space Observer for Active Noise Control Systems
Published 2009“…The secondary path of the ANC system is modeled by using the LMS algorithm to complete the design of the Filtered-X Least Mean Square (FXLMS) controller. …”
Get full text
Get full text
Thesis -
10
A test case generation framework based on UML statechart diagram
Published 2018“…They are relation table, relation graph, consistency checking, test path minimization, test path prioritization, path pruning, test path generation, and test case generation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Monkeypox disease detection using Convolutional Neural Network (CNN) / Nur Farhain Humaira Ghanami
Published 2024“…The project is to study the CNN algorithm and develop a prototype to evaluate the accuracy of monkeypox disease detection using CNN. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
RISC-V instruction set extension on blockchain application
Published 2024“…This project is an instruction set extension project based on RISC-V architecture for academic purpose. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Object tracing from synthetic fluid spray through instance segmentation
Published 2024“…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
Get full text
Get full text
Thesis -
16
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
17
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In this project, a collision avoidance strategy is designed and developed for a differential drive mobile robot, which is built using ATmega 328p microcontroller. Two algorithms, namely Artificial Potential Filed (APF) and Bug 2 are integrated into the model with an ultrasonic sensor to detect and avoid the obstacles. …”
Get full text
Get full text
Monograph -
18
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…HAS is to schedule the instructions based on the priority of instructions from the aspect of space and time. …”
Get full text
Get full text
Thesis -
19
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
Get full text
Get full text
Thesis -
20
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter
