Search Results - (( basic selection methods algorithm ) OR ( pattern detection path algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…In addition, it improves classification metrics in comparison to basic feature selection methods.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…This thesis proposes methods that can overcome the problems of good behaviour selection and good behaviour deletion. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications by Teo, Chee Huat

    Published 2016
    “…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction by Abasi, Ammar Kamal Mousa

    Published 2021
    “…To achieve this aim: First, A new feature selection method for TDC, that is, binary multi-verse optimizer algorithm (BMVO) is proposed to eliminate irrelevantly, redundant features and obtain a new subset of more informative features. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…A systematic method for selecting the ANN's input variables was developed using Matlab Programming language.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…Artificial Bee Colony (ABC) algorithm is one of the methods used to solve the flowshop scheduling problem but only a few researches have been found using this method in this area. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Robust correlation feature selection based support vector machine approach for high dimensional datasets by Baba, Ishaq Abdullahi, Mohammed, Mohammed Bappah, Jillahi, Kamal Bakari, Umar, Aliyu, Hendi, Hasan Talib

    Published 2025
    “…Correlation-based feature selection methods are popular tools used to select the most important variables to include the true model in the analysis of sparse and high-dimensional models. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim by Ibrahim, Erman

    Published 2007
    “…Finally, the BP algorithm has been prove as a method that can be used for recognizing hand gesture for sign language and the successful task of recognition also dependent an the hnage processing. …”
    Get full text
    Thesis
  19. 19

    A phonetically rich and balanced lexical corpus using zipfian distribution for an under resourced language / Aminath Farshana by Aminath , Farshana

    Published 2018
    “…The performance of the proposed method was also evaluated by comparing the results with an existing benchmark method (greedy algorithm). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20