Search Results - (( using vector path algorithm ) OR ( data classification using algorithm ))

Refine Results
  1. 1

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…Besides this, many satellite imagery platforms provide free accessibility of such data. In this dissertation, a new vegetation encroachment detection method was proposed by studying the feasibility of using the visible-light band of highresolution satellite images using the RetinaNet deep learning model and Support Vector Machine algorithm (SVM). …”
    text::Thesis
  2. 2

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space by Zahari, Ammar, Ismail , Amelia Ritahani, Desia, Recky

    Published 2015
    “…This research explores path integration in mobile robot navigation and path optimization technique using vector calculus. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…The data collected was used to learn the structure of BN via some known algorithms using R programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…AODV uses a distance or hop count for determining the best forwarding path and store the sequence number at table entry to ensure the path information is up-to-date. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak by Abdul Razak, Noorfadzli

    Published 2018
    “…The second stage focuses on using the vector to generate an admissible cubic path via Hermite interpolation technique integrated with time and tangent transformation scheme. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…The knowledge acquired by the process is interpreted and mapped into vectors, which are kept in the database and used by the system to guide its reasoning process. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Since the 1960s, many algorithms for data classification have been proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Dengue classification system using clonal selection algorithm / Karimah Mohd by Mohd, Karimah

    Published 2012
    “…Some of the dengue data are used to test the dengue classification system to produce the classification accuracy. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks by Moghanjoughi, Ayyoub Akbari

    Published 2009
    “…By this procedure, IANRA is able to prevent some of the existing difficulties in AntNet, MACO and Ad hoc On Demand Distance Vector (AODV) routing algorithms. OMNeT++ was used to simulate the IARNA algorithm for WMNs and MANET. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd by Nur Farahaina, Idris

    Published 2022
    “…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…Nevertheless, there are some limitations in ID3 algorithm that can affect the performance in the classification of data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of a motion planning and obstacle avoidance algorithm using adaptive neuro fuzzy inference system for mobile robot navigation by Muslim, Farah Kamil Abid

    Published 2017
    “…It also efficiently predicts the obstacles’ velocity vector. The designed multilayer decision-based fuzzy logic model effectively solves the path planning queries in crowded and complex situations without any failure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network by Tareq, M., Abed, S.A., Sundararajan, E.A.

    Published 2019
    “…Hence, emphasizing the need to establish an efficient connection inside the network we use for a routing protocol to explore paths among nodes. …”
    Get full text
    Get full text
    Article