Search Results - (( using detection method algorithm ) OR ( based interactive path algorithm ))
Search alternatives:
- method algorithm »
- interactive path »
- using detection »
- path algorithm »
-
1
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment
Published 2025“…As vital components of human-computer interaction, CAPTCHAs are widely used across various industries, including video, education, finance, e-commerce, aviation, and public services. …”
Get full text
Get full text
Thesis -
3
Path planning methods for autonomous vehicles at intersections: A review
Published 2026“…This review paper presents a comprehensive analysis of major path-planning methods used in Autonomous Vehicle (AV) navigation at intersections, including graph-based, sampling-based, curve-based, optimization-based, and machine learning–based approaches, while also examining emerging AI-driven path planners to better understand their capabilities. …”
Get full text
Get full text
Get full text
Article -
4
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…Experimental works show the capabilities of the developed DSS in human path prediction using both simulated and actual WLAN-based positioning dataset. …”
Get full text
Get full text
Thesis -
5
Reliable Fuzzy-Based Multi-Path Routing Protocol Based on Whale Optimization Algorithm to Improve QOS in 5G Networks for IOMT Applications
Published 2024“…The "Quality of Services (QoS)" in 5G-based IoMT is improved by the Reliable Fuzzy-based Multi-path routing system shown in this study. …”
Article -
6
AR technology-assisted selfie design and dissemination path analysis
Published 2023“…Augmented reality (AR) is a technology based on 3D registration, virtual-real fusion and human-computer interaction to achieve the integration of virtual objects and real scenes. …”
Get full text
Get full text
Article -
7
-
8
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…The main idea in this algorithm is the indirect communication between the ants which is established by the means of pheromones in finding the shortest path between their nest and food [14]. …”
Get full text
Get full text
Monograph -
9
Enchancing QoS protection in MPLS networks
Published 2010“…In this work, we proposed the traffic splitter to split the protected traffic after failure, in case the available bandwidth in the alternative path is not enough to deliver the traffic. Finally, alternative path selection is updated based on current network resource availability. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
11
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
13
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
15
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…The algorithm employs the First Lag Autocorrelation and the Modified Sample Entropy methods to detect and classify weak hand closing and opening muscle activities by using signal obtained from the Flexor Carpi Ulnaris forearm muscle. …”
Get full text
Get full text
Thesis -
16
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…The CTMRP is designed for decision maker based on threshold value of average paths signal for efficient transmission of the Text, image, audio and video as well as sending the data via multiple paths, which mitigate the negatives effects causes from forcing the nodes to send the data via single. …”
Get full text
Get full text
Get full text
Article -
17
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
19
Obfuscated Malware Detection: Impacts on Detection Methods
Published 2024“…This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. …”
Conference Paper -
20
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article
