Search Results - (( java location based algorithm ) OR ( basic detection tree algorithm ))
Search alternatives:
- basic detection »
- detection tree »
- tree algorithm »
- java »
-
1
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Image Based Oil Palm Tree Crowns Detection
Published 2020“…Image Based Oil Palm Tree Crowns Detection system is a basic system that enables the detection of oil palm tree crowns from red, green and blue (RGB) aerial images. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
4
-
5
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
6
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
7
-
8
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…The study focuses on two basic aspects of oil tank inspection through the images captured by the UAV, namely, the detection of defects and the distinction between defects and noise. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…In general, there are two basic approaches to enhance the speed of the multiplier, Booth Algorithm and the Wallace Tree compressors or counter. …”
Get full text
Get full text
Conference or Workshop Item -
10
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…Furthermore, a comprehensive review of the existing static, dynamic, and hybrid Android malware detection approaches is presented in this study. More significantly, this paper empirically discusses and compares the performances of six supervised machine learning algorithms, known as K-Nearest Neighbors (K-NN), Decision Tree (DT), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB), and Logistic Regression (LR), which are commonly used in the literature for detecting malware apps.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Recovery of tree community composition across different types of anthropogenic disturbances and characterization of their effect using Landsat time series in Bornean tropical monta...
Published 2022“…We also investigated the use of metrics from spectral trajectories of a Landsat time series (LTS) change detection algorithm (LandTrendr) to identify characteristics of disturbance events and their linkage to the recovery of tree community composition, with field validation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza
Published 2021“…Thus, this research is aimed to develop two models. First, the BrC detection model is developed to diagnose BrT basic types like benign and malignant. …”
Get full text
Get full text
Get full text
Thesis -
15
Estimation of electric vehicle turning radius through machine learning for roundabout cornering
Published 2021“…A compact electric vehicle model is used to obtain data and measurements of the vehicle states for different sets of road radius. The augmented basic measurements is fed to an Extra Tree Regression to predict the turning radius of the vehicle. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee
Published 2023“…The proposed deep learning model renders faster without the use of SMOTE. Any resampling algorithm is not a necessity in the case of this proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis
