Search Results - (( _ application ((mead algorithm) OR (tree algorithm)) ) OR ( its location based algorithm ))

Refine Results
  1. 1

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The proposed model consists of Dynamic-Coalition framework, Static-Coalition algorithm, and Coalition-Based Index-Tree framework. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The experimental results show that combining the advantages of the geometric based validation and contrast based filtering as well as avoiding large quantization errors, lead to significant enhancement in the performance of the seed point detection algorithm in terms of balancing between the precision and recall. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones by Khudhayer, Wael A.

    Published 2020
    “…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  10. 10

    Machine learning-based change detection for land use land cover in Malaysia by Mohd Noor, Muhammad Fareed, Rahmat, Noor Zarikh Khuzaimi, Abdullah, Nur Azam, Mohd Ibrahim, Azhar, Al Mahmud, Suaib, Mardzuki, Muhammad Imran

    Published 2025
    “…For supervised classification, Support Vector Machine (SVM), Classification and Regression Tree (CART), and Random Forest classifiers were tested. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…The guidance algorithm is formed based on an initial direction and distance of the target location without considering the time taken by the robot to reach the desired destination. …”
    Get full text
    Learning Object
  17. 17

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20