Search Results - (( based application ((tree algorithm) OR (_ algorithm)) ) OR ( from location based algorithm ))
Search alternatives:
- based application »
- tree algorithm »
- from location »
-
1
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for a multicast-based mobile IPv6 network, such that the branches of the tree constitute the shortest paths from the packet source to each of the visited locations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This is an extension to AMTree Protocol. The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
4
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for a multicast-based mobile IPv6 network, such that the branches of the tree constitute the shortest paths from the packet source to each of the visited locations. …”
Get full text
Get full text
Conference or Workshop Item -
5
Implementation of machine learning algorithms for streamflow prediction of Dokan dam
Published 2023“…This study aims at comparing the application of deep learning algorithms and conventional machine learning algorithms for predicting reservoir inflow. …”
text::Thesis -
6
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
7
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
8
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
text::Thesis -
9
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Location-based applications enabled by advances in sensing and tracking technology but it also create significant privacy risks. …”
Get full text
Get full text
Thesis -
10
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
11
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023text::Thesis -
12
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…In contrast, the average Euclidean algorithm is based on the average Euclidean of the RPs from the RP cluster set. …”
Get full text
Get full text
Thesis -
13
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
14
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Opposition-based spiral dynamic algorithm with an application to optimize type-2 fuzzy control for an inverted pendulum system
Published 2022“…Spiral Dynamic Algorithm (SDA) is a group-based optimization algorithm formulated based on the concept of a natural spiral phenomenon on earth. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
18
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
Get full text
Get full text
Thesis -
19
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. …”
Get full text
Get full text
Get full text
Article -
20
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021“…In this study, UAV technology has been taking a look at several algorithms for estimating tree height value of a single tree crown. …”
Get full text
Get full text
Conference or Workshop Item
