Search Results - (( intelligence data matching algorithm ) OR ( intelligence system using algorithm ))
Search alternatives:
- intelligence system »
- intelligence data »
- using algorithm »
- matching »
-
1
A Novel Map-matching Algorithm to Improve Vehicle Tracking System Accuracy
Published 2008“…Satellite-based Vehicle Tracking System accuracy can be improved by augmenting the positional information using road network data, in a process known as map-matching. …”
Get full text
Get full text
Article -
2
A novel map-matching algorithm to improve vehicle tracking system accuracy
Published 2007“…The satellite-based Vehicle Tracking System accuracy can be improved by augmenting the positional information using road network data, in a process known as map-matching. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy
Published 2008“…The satellite-based vehicle tracking systems accuracy can be improved by augmenting the positional information using road network data, in a process known as map-matching. …”
Get full text
Get full text
Thesis -
4
A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy
Published 2008“…The satellite-based vehicle tracking systems accuracy can be improved by augmenting the positional information using road network data, in a process known as map-niatcliing. …”
Get full text
Get full text
Final Year Project -
5
A new text-based w-distance metric to find the perfect match between words
Published 2020Get full text
Get full text
Article -
6
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…These algorithms identify hidden patterns or data groupings without the assistance of a human. …”
Get full text
Get full text
Undergraduates Project Papers -
7
-
8
Enhancement of network security by use machine learning
Published 2019“…The time taken to reach the accuracy is also short with less number of iteration. The ANNDL uses iterations method to detect the data, do matching and identify the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Design of real time intelligent buses notification system for passengers
Published 2012“…In order to build the most convenient and reliable system, map matching for location data comparison using optimization technique, Design of Experiment (DOE) is applied. …”
Get full text
Get full text
Thesis -
10
Gait pattern detection for amputated prosthetic using fuzzy algorithm
Published 2015“…The work included in this project focuses on developing a system to measure the angular displacement of human joint of lower part with patients having this problem and then applying gait phase detection using intelligent algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Designing an integrated AIOT system for tracking class attendance
Published 2024“…The system is able to capture the students' real facial feature data, and uses it as a tool to achieve high-accuracy student identification. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Trends on technologies and artificial intelligence in education for personalized learning: systematic literature review
Published 2022“…Personalised learning using AI is an approach that focuses on generating training to match the specific needs of each student such as in adaptive learning, online learning, MOOCs, and many other technologies. …”
Get full text
Get full text
Article -
13
Text to Image Generation Using Machine Learning
Published 2024“…One of the usefulness of automatic picture synthesis is the generation of images using conditional generative models. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Adaptive and optimized radio resource allocation algorithms for OFDMA based networks
Published 2015“…AORAA contains an adaptive and optimized subcarrier allocation algorithm which uses graph theoretic techniques to do the best probable matching of subcarrier and users’ channel information. …”
Get full text
Get full text
Thesis -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
Get full text
Get full text
Get full text
Article
