Search Results - (( _ location based algorithm ) OR ( based application clustering algorithm ))*

Refine Results
  1. 1

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…In contrast, the average Euclidean algorithm is based on the average Euclidean of the RPs from the RP cluster set. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Kernel and multi-class classifiers for multi-floor wlan localisation by Abd Rahman, Mohd Amiruddin

    Published 2016
    “…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Data clustering using the bees algorithm by Pham, D.T, Otri, S., Afify, A., Mahmuddin, Massudi, Al-Jabbouli, H.

    Published 2007
    “…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Clustering of Indonesian forest fires using self organizing maps by Selamat, Ali, Selamat, Md. Hafiz

    Published 2006
    “…The input data is based on the quantity of the hot spots of forest fires that spread in several locations within ten months period. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Fuzzy rank cluster top k Euclidean distance and triangle based algorithm for magnetic field indoor positioning system by Bundak, Caceja Elyca, Abd Rahman, Mohd Amiruddin, Abdul Karim, Muhammad Khalis, Osman, Nurul Huda

    Published 2021
    “…Then, we create a rank cluster algorithm where we match the top 10 ranks RPs with the nearest Euclidean distance to the TP with the RPs cluster. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Off-the-shelf indoor localization system using radio frequency for wireless local area network by Alhammadi, Abdulraqeb Shaif Ahmed

    Published 2018
    “…In this research, a fingerprinting-based location algorithm is applied in indoor environments using WLAN. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Balancing exploration and exploitation in ACS algorithms for data clustering by Jabbar, Ayad Mohammed, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments by AL-Obaidi, A.S., Jubair, M.A., Aziz, I.A., Ahmad, M.R., Mostafa, S.A., Mahdin, H., AL-Tickriti, A.T., Hassan, M.H.

    Published 2022
    “…In addition, a clustering algorithm that defines mobility vector and uses Cauchy-based density for enabling adding vehicles to their respective clusters. …”
    Get full text
    Get full text
    Article
  10. 10

    Pengesanan nombor plat kenderaan menggunakan alkhwarizmi gugusan dan kelancaran jarak larian(GKJL) by Siti Norul Huda Sheikh Abdullah, Marzuki Khalid, Khairuddin Omar, Rubiyah Yusof

    Published 2009
    “…A new algorithm called Cluster Run Length Smoothing Algorithm (CRLSA) approach was applied to locate the license plate at the right position. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…Finally, surface defects are segmented from an anomaly heat map which is generated based on histogram distance functions. Results show that the proposed algorithm required a learning dataset size as small as 5 samples and was resistant to learning labelling error up to 50%.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Depth Image Layers Separation (DILS) algorithm of image view synthesis based on stereo vision by Abd Manap, Nurulfajar, Soraghan, John J., Petropoulakis, Lykourgos

    Published 2013
    “…The approach is to separate the depth map into several layers identified through histogram-based clustering. Each layer is extracted using inter-view interpolation to create objects based on location and depth. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fireflyclust: an automated hierarchical text clustering approach by Mohammed, Athraa Jasim, Yusof, Yuhanis, Husni, Husniza

    Published 2017
    “…The proposed clustering method operates based on five phases: data pre-processing, clustering, item re-location, cluster selection and cluster refinement. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Reliable Fuzzy-Based Multi-Path Routing Protocol Based on Whale Optimization Algorithm to Improve QOS in 5G Networks for IOMT Applications by Al-Mukhtar F.S., Jaaz Z.A., Hamad A.H.

    Published 2024
    “…The residual energy-based Cluster Head (CH) selection strategy rotates the CH location among nodes with greater energy levels than the others. …”
    Article
  19. 19

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…The hidden layer includes 1 layer with different neurons. Based on the mentioned criteria several scenarios were defined and compared which resulted to a structure of 8-10-1 with the Levenberg-Marquardt (LM) as the training algorithm and logistic sigmoid function in the output layer. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The efficiency of this application will be measured based on the results of numerical analysis and parallel performance.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item