Search Results - (( java location based algorithm ) OR ( based classification path algorithm ))
Search alternatives:
- based classification »
- classification path »
- path algorithm »
- java »
-
1
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…ACO classification accuracy is compared to Genetic Algorithm classifier which also a wrapper method. …”
Get full text
Get full text
Thesis -
3
Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks
Published 2014“…This problem can best be modelled through fuzzy logic based classification that is based on continuous values. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…The main motivation of this study is to find out techniques that may improve EEG signal classification. SAX algorithm may bring improvement to classic time series classification, so we investigate it`s impact on EEG signal classification. …”
Get full text
Thesis -
6
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
7
Implementation of machine learning algorithm in preventing network congestion
Published 2023text::Final Year Project -
8
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
9
Animal voice recognition for identification (ID) detection system
Published 2011“…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
Get full text
Get full text
Conference or Workshop Item -
10
Dog voice identification (ID) for detection system
Published 2012“…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…The protocol compares the power available on all the paths from source to sink and then selects the path with highest power. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Comparison between Levenberg-Marquardt and scaled conjugate gradient training algorithms for ionosphere condition using Multilayer Perceptrons / Mohd Sharif Ibrahim
Published 2010“…Based on the result, there are concluded that both algorithms were comparable in terms of accuracy and speed. …”
Get full text
Get full text
Thesis -
15
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2017“…The result of R2 and RMSEC after variable selection for transflectance and transmission were improved significantly. Based on the result of classification and quantification analysis, the transmission mode has yield better prediction model compared to the transflectance mode to distinguish the pure and adulterated palm oil.…”
Get full text
Get full text
Get full text
Article -
16
Ant colony optimization for vehicle traffic systems: applications and challenges
Published 2014“…Thus, ant-based algorithms are now being adopted by vehicle traffic systems VTSs to guide vehicles to less congested paths. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
18
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2024“…The result of R2 and RMSEC after variable selection for transflectance and transmission were improved significantly. Based on the result of classification and quantification analysis, the transmission mode has yield better prediction model compared to the transflectance mode to distinguish the pure and adulterated palm oil.…”
Article -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise
