Search Results - (( intelligence system from algorithm ) OR ( intelligence based maps algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- from algorithm »
- maps algorithm »
- based maps »
-
1
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Results from the simulated and evaluated algorithm showed that the proposed model was able to achieve a mAP of 97.8 in the daytime dataset and 95.1 in the nighttime dataset.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…Disconnection of the mobile terminal (MT) from the access points (AP) in WLAN-based systems is the example case of the problem. …”
Get full text
Get full text
Thesis -
4
Development of an intelligent system using Kernel-based learning methods for predicting oil-palm yield.
Published 2005“…Intelligent systems based on machine learning techniques, such as classification, clustering, are gaining wide spread popularity in real world applications. …”
Get full text
Get full text
Article -
5
Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing
Published 2022“…The solar energy collected by the sun-tracking system depends on the accuracy of the sun-tracking algorithm, which is different for each type of sun-tracking system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing
Published 2015“…One of the prominent intelligent algorithms is ant colony system (ACS) which is implemented widely to solve various types of scheduling problems. …”
Get full text
Get full text
Get full text
Thesis -
7
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
8
Feature-based face recognition system using utilized artificial neural network
Published 2010Get full text
Thesis -
9
-
10
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
11
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003Get full text
Get full text
Thesis -
12
-
13
Assessing the outcome of Competencies Level from Knowledge-Based Project
Published 2008Get full text
Get full text
Final Year Project -
14
Design of real time intelligent buses notification system for passengers
Published 2012“…In this dissertation, a new real time intelligent public transport movement monitoring system and station reporting based on GPS and succession of RF Radio Chips is presented. …”
Get full text
Get full text
Thesis -
15
Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm
Published 2021“…With the recent technological advancement, especially in machine vision and artificial intelligence, automated or semi-automated missing road lane marking detection systems can potentially be developed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
A framework for predicting oil-palm yield from climate data
Published 2006“…Intelligent systems based on machine learning techniques, such as classification, clustering, are gaining wide spread popularity in real world applications. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Facial emotion detection using Guided Particle Swarm Optimization (GPSO)
Published 2009Get full text
Working Paper -
20
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…It is a concept borrowed from human immunology system (HIS), where it has been mapped into network security environment. …”
Proceedings Paper
