Search Results - (( data classification path algorithm ) OR ( using classification using algorithm ))
Search alternatives:
- using classification »
- classification using »
- data classification »
- classification path »
- using algorithm »
- path algorithm »
-
1
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…ACO classification accuracy is compared to Genetic Algorithm classifier which also a wrapper method. …”
Get full text
Get full text
Thesis -
2
Using graph algorithm and classification technique for finding an optimal bus route in time-dependent travel times
Published 2016“…The proposed technique is able to find a least spent travel time path between two nodes in a bus network with time-dependence.Graph algorithm is used to generate all possible paths to reveal the distances.Classification technique is then used to analysis traffic situation in different period of the time.By analysis traffic situation, date, time, week, month, location are used as a main factor for training process in classification technique.From the experimental studies, the proposed technique is able to show the best route from any given node to the final destination depending on the different period of the time.The proposed technique provides significant benefit for traveler to select the best bus route, which is short distance and fast, among generated routes…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Developing and validating a simulation model for counting and classification of vehicles
Published 2016“…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
Get full text
Get full text
Get full text
Article -
4
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…The main motivation of this study is to find out techniques that may improve EEG signal classification. SAX algorithm may bring improvement to classic time series classification, so we investigate it`s impact on EEG signal classification. …”
Get full text
Thesis -
5
-
6
Implementation of machine learning algorithm in preventing network congestion
Published 2023text::Final Year Project -
7
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…Total number rules generated for the best classification model is recorded where the 30% of data were used for training and 70% were kept as test data. …”
Get full text
Get full text
Thesis -
8
Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah
Published 2019“…By the path reference created by A* algorithm the robot is capable in optimizing its path to reach the designated destination. …”
Get full text
Get full text
Get full text
Thesis -
9
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
10
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
Get full text
Get full text
Get full text
Thesis -
11
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…A data augmentation algorithm is used for feature generation to enhance the model’s training robustness. …”
Get full text
Get full text
Get full text
Article -
12
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
13
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…The study shows that 23 of the rules are cryptographically strong where eight of them are used in our hash function design. Following the third classification of the framework, STITCH-256 is analyzed against all the generic attacks and is measured against its avalanche effect and randomness. …”
Get full text
Get full text
Thesis -
14
-
15
Radar-based collision avoidance on Unmanned Surface Vehicles (USV)
Published 2022“…This information can help make an initial decision in the collision avoidance algorithm, as shown in this study. The classification of targets is performed based on radar plotting principle. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Oil Palm Yield Data Collection Using Image Processing
Published 2021“…This API is important in object classification and counting which serves as the final product in the system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…Finally, the results were compared with the existing proposed Flower Pollination Algorithm (FPA) at the time of FCC extraction. The results show that WOA is a bit better at getting shorter path lengths than FPA in terms of path lengths. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Dengue classification system using clonal selection algorithm / Karimah Mohd
Published 2012“…This project can be improved by making a comparative study on Artificial Immune System and other techniques or algorithms used to solve dengue classification problems.…”
Get full text
Get full text
Thesis -
19
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…The comparison showed that, the accuracy of the unsupervised classification map with value of 88.4% that was generated by using the cluster labelling algorithm was slightly more than the maximum-likelihood supervised classification map with value of 87.5%. …”
Get full text
Get full text
Thesis -
20
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…The Information Gain algorithm is used to select the most significant permissions, then the classification algorithms Naïve Bayes, Random Forest and J48 used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Article
