Search Results - (( parallel extraction path algorithm ) OR ( pattern detection path algorithm ))
Search alternatives:
- parallel extraction »
- pattern detection »
- extraction path »
- path algorithm »
- detection path »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
2
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
4
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
5
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Parallel imaging is a robust method for accelerating the data acquisition in Magnetic Resonance Imaging (MRI). …”
Get full text
Get full text
Get full text
Thesis -
6
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
7
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
Get full text
Get full text
Conference or Workshop Item -
9
WiFi-based human activity recognition through wall using deep learning
Published 2023“…Furthermore, a deep learning algorithm based on RNN with an LSTM algorithm is used to classify the activity instances indoors, achieving up to 97.5% accuracy in classifying seven activities. …”
Get full text
Get full text
Get full text
Get full text
Article
