Search Results - (( based application based algorithm ) OR ( pattern detection path algorithm ))

Refine Results
  1. 1

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…Voice recognition systems have become the important applications for speech recognition technology. In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…Voice recognition systems have become the important applications for speech recognition technology. In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…Vision-based hand posture detection and tracking is an important issue for Human to Computer Interaction applications. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  4. 4

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  7. 7

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9
  10. 10

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…In order to overcome latency problem, this research is an attempt to suggest a new prediction algorithm based on heuristic that could be used to develop a more effective and general system for virtual training applications. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A simulation based fly optimisation algorithm for swarms of mini autonomous surface vehicles application by Zainal Abidin, Zulkifli

    Published 2011
    “…Present paper intends to provide a detailed description of a new bio-inspired Metaheuristic Algorithm. Based on the detailed study of the Drosophila, the flowchart behaviour for the algorithm, code implementation, methodologies and simulation analysis, a novel Fly Optimization Algorithm (FOA) approach is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…Due to data streams characteristics, the traditional density-based clustering is not applicable. Recently, a lot of density-based clustering algorithms are extended for data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20