Search Results - (( using data path algorithm ) OR ( data classification using algorithm ))
Search alternatives:
- classification using »
- data classification »
- using algorithm »
- path algorithm »
-
1
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…Pheromone concept is the main criterion that distinguish ACO to other algorithms. Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
Get full text
Get full text
Thesis -
2
Using graph algorithm and classification technique for finding an optimal bus route in time-dependent travel times
Published 2016“…However, they are suffering from the long hours in traffic jam especially in rush hour.They also cannot avoid this such jam as bus routes are fixed by Bangkok Mass Transit Authority (BMTA).This paper aims to propose a technique for finding an Optimal Bus Route in Time-Dependent Travel Times by using graph algorithm and data mining technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Developing and validating a simulation model for counting and classification of vehicles
Published 2016“…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
Get full text
Get full text
Get full text
Article -
4
Implementation of machine learning algorithm in preventing network congestion
Published 2023text::Final Year Project -
5
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
Get full text
Thesis -
6
Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah
Published 2019“…By the path reference created by A* algorithm the robot is capable in optimizing its path to reach the designated destination. …”
Get full text
Get full text
Get full text
Thesis -
7
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…Besides this, many satellite imagery platforms provide free accessibility of such data. In this dissertation, a new vegetation encroachment detection method was proposed by studying the feasibility of using the visible-light band of highresolution satellite images using the RetinaNet deep learning model and Support Vector Machine algorithm (SVM). …”
text::Thesis -
8
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…Total number rules generated for the best classification model is recorded where the 30% of data were used for training and 70% were kept as test data. …”
Get full text
Get full text
Thesis -
11
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
12
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…A data augmentation algorithm is used for feature generation to enhance the model’s training robustness. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Radar-based collision avoidance on Unmanned Surface Vehicles (USV)
Published 2022“…This information can help make an initial decision in the collision avoidance algorithm, as shown in this study. The classification of targets is performed based on radar plotting principle. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Oil Palm Yield Data Collection Using Image Processing
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…The study shows that 23 of the rules are cryptographically strong where eight of them are used in our hash function design. Following the third classification of the framework, STITCH-256 is analyzed against all the generic attacks and is measured against its avalanche effect and randomness. …”
Get full text
Get full text
Thesis -
17
Automated path testing using the negative selection algorithm
Published 2017“…Negative selection algorithm (NSA) has been used in this paper to generate test data for path testing automatically. …”
Get full text
Get full text
Indexed Article -
18
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
19
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
20
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article
