Search Results - (( _ application usage algorithm ) OR ( its application means algorithm ))
Search alternatives:
- application usage »
- application means »
- usage algorithm »
- means algorithm »
-
1
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
2
Image Segmentation using Enhanced K-means Clustering with Hybrid Image Filtering for Acute Leukemia Blood Cells Microscopic Images
Published 2024thesis::master thesis -
3
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Unmanned aerial vehicle assisted localization using multi-sensor fusion and ground vehicle approach
Published 2022“…Previous researches have extensively studied the usage of sensor fusion algorithms to combine the sensors on board of the UAV to improve its localization. …”
Get full text
Get full text
Article -
5
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Tailoring the energy harvesting capacity of zinc selenide semiconductor nanomaterial through optical band gap modeling using genetically optimized intelligent method
Published 2021“…These characteristics contribute significantly to its wide usage as sensors, optical filters, photo-catalysts, optical recording materials, and photovoltaics, among others. …”
Get full text
Get full text
Article -
8
Contactless palmprint verification using siamese networks
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Domain Specific Concept Ontologies And Text Summarization As Hierarchical Fuzzy Logic Ranking Indicator On Malay Text Corpus
Published 2024Get full text
Get full text
journal::journal article -
11
Zero distortion-based steganography for handwritten signature
Published 2018“…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. In its simplest form, the existence of intra-user variability within handwritten signature samples of an individual is explored using the Kruskal-Wallis hypothesis test. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
14
Experiment with Text Summarization as a Positive Hierarchical Fuzzy Logic Ranking Indicator for Domain Specific Retrieval of Malay Translated Hadith
Published 2024journal::journal article -
15
-
16
-
17
Beta Distribution Weighted Fuzzy C-Ordered-Means Clustering
Published 2024“…The fuzzy C-ordered-means clustering (FCOM) is a fuzzy clustering algorithm that enhances robustness and clustering accuracy through the ordered mechanism based on fuzzy C-means (FCM). …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
A Comparative Study Of Fuzzy C-Means And K-Means Clustering Techniques
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item
