Search Results - (( parallel optimization path algorithm ) OR ( rate extraction sensor algorithm ))
Search alternatives:
- parallel optimization »
- optimization path »
- extraction sensor »
- sensor algorithm »
- rate extraction »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
5
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…The study proposes a multi-view ensemble algorithm to integrate predicted values of different motion sensors. …”
Get full text
Get full text
Article -
6
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…The reflectance data of different wavelength bands incidence from 8 LED modules upon the oil palm FFB, were extracted by 4 different sensors of a spectrometer in laboratory experiment, for onward detailed analysis with machine learning algorithms in WEKA data mining tool. …”
Get full text
Get full text
Get full text
Thesis -
7
A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors
Published 2008“…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
Get full text
Thesis -
8
Obstacle detection for Unmanned Aerial Vehicle (UAV)
Published 2022“…Each sensor in the sensor-based technique possesses different advantages and disadvantages. …”
Get full text
Get full text
Get full text
Article -
9
Exploration of genetic algorithm in network coding for wireless sensor networks
Published 2014“…Genetic algorithm will search for optimum routes to the destination according to the desired throughput with a desired multicast rate. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Development of rheumatoid arthritis classification from electronic image sensor using ensemble method
Published 2020“…The RA dataset was gathered from the analysis of white blood cell classification using features extracted from the image of lymphocytes acquired from a digital microscope with an electronic image sensor. …”
Get full text
Get full text
Article -
11
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…In a human detection, the software is represented by algorithms, in which algorithm also being used in the process of training the dataset. …”
Get full text
Get full text
Final Year Project -
12
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…These sensors are pre-processed and different feature sets such as time domain, frequency domain, wavelet transform are extracted and transform using machine learning algorithm for human activity classification and monitoring. …”
Get full text
Get full text
Article -
13
Smart fall detection by enhanced SVM with fuzzy logic membership function
Published 2023“…So far, the most widely used fall prediction methods collect data from inertial measurement unit (IMU) sensors. In addition, they use thresholds to identify falls based on artificial experiences or machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Article -
14
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
Get full text
Get full text
Conference or Workshop Item -
15
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
16
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…This project looks into various data compression technique and when to use them, with specifically focus on ii evaluating the performance of existing data compression and extraction algorithms that best suit scientific dataset. …”
Get full text
Get full text
Thesis -
17
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
18
Kinect-based human gait recognition using locally linear embedded and support vector machine
Published 2018“…Firstly, dynamic gait features for one gait cycle are extracted from each subject’s walking gait that is acquired using Kinect sensor. …”
Get full text
Get full text
Get full text
Article -
19
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. …”
Get full text
Get full text
Article -
20
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The features of flow-based network traffic are extracted for behavior analysis with port-wise profiling based on the data baseline, and anomaly detection classification and prediction using machine learning algorithms are performed.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
