Search Results - (( (evolution OR solution) detection path algorithm ) OR ( using codification based algorithm ))
Search alternatives:
- using codification »
- codification based »
- detection path »
- path algorithm »
-
1
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
2
Advanced computational geometry for proximity queries of convex polyhedras
Published 2009Get full text
Working Paper -
3
Particle swarm optimization approach in route navigation for PoSVI-Cane
Published 2023“…Here, Particle Swarm Optimization (PSO) path planning algorithm computes the shortest possible path based on the collection of coordinates along the pedestrian walkway. …”
Get full text
Get full text
Get full text
Article -
4
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…The ST itself is a conceptual framework that examines, reframes the problem and finds the solution. Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
6
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
7
Automated density and growth estimation in precision aquaculture systems for prawn cultivation using computer vision techniques
Published 2024“…By employing the state-of-the-art You Only Look Once (YOLO) v7 object detection algorithm, the project aims to develop a system capable of accurately detecting and classifying prawns based on their growth stages. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
LTE-based passive radar for ground target detection and tracking
Published 2015Get full text
Get full text
Thesis -
9
Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi
Published 2024“…The vehicle uses ultrasonic sensors and a USB webcam to detect and avoid obstacles on its path with the aid of a Raspberry Pie program that effectively executes decision-making changes to manoeuvre the vehicle away from objects on a free path. …”
Get full text
Get full text
Get full text
Article -
10
Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks
Published 2014“…However, in infrastructure and the client part of WMN movement of nodes still creates delay as path failure detection and re-establishment consumes considerable time. …”
Get full text
Get full text
Conference or Workshop Item -
11
Design and implementation of an object-following system by using DJI Tello drone
Published 2025“…The system employs computer vision techniques, particularly Convolutional Neural Networks (CNNs), to detect and track moving objects in real time, while dynamically adjusting the drone’s flight path to maintain continuous visual contact. …”
Get full text
Get full text
Get full text
Article -
12
Smart resource tracking and tracing system (SRTTS)
Published 2017“…Method used by the system is providing an algorithm on showing the shortest path which will act as a recommender system. …”
Get full text
Get full text
Book Section -
13
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
14
Peramalan Isyarat Satelit Menggunakan Kaedah Rangkaian Neural
Published 2006“…The objective for designing this system can be explained in the following example. If the system detects rain that causes interference in the wave transmission path, a signal will be sent to the satellite to amplify the transmitting signal. …”
Get full text
Get full text
Monograph -
15
Design And Implementation of an Object-Following System by Using DJI Tello Drone
Published 2026journal::journal article -
16
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…Three speech databases were used for the experiments including prolonged Malay vowels and Malay continuous speech database based on children’s speech and TIMIT database based on adult speeches. …”
Get full text
Get full text
Thesis -
17
Totally opportunistic routing algorithm for underwater wireless sensor network
Published 2019“…In the fourth and final part, a void detection and avoidance based routing protocol called NA-TORA with VA has been presented. …”
Get full text
Get full text
Thesis -
18
Protection Schemes for Fiber to the Home Access Networks with Intra Network Switch
Published 2008“…Thus, a new way of providing fault tolerance to the system has to be introduced, by taking costs consideration and also efficiency in deploying the solution. In this thesis, three novel cost efficient schemes for providing fault tolerance to the FTTH system are introduced and methodologies to detect failures are also suggested. …”
Get full text
Get full text
Thesis
