Search Results - (( based location based algorithm ) OR ( _ application ((ria algorithm) OR (tree algorithm)) ))*
Search alternatives:
- based location »
- tree algorithm »
- ria algorithm »
-
1
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
2
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The proposed model consists of Dynamic-Coalition framework, Static-Coalition algorithm, and Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
3
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…A new multicast group joidleave mechanism for mobile nodes (MNs) is proposed. The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for a multicast-based mobile IPv6 network, such that the branches of the tree constitute the shortest paths from the packet source to each of the visited locations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Algorithm of the longest commonly consecutive word for plagiarism detection in text based document
Published 2008“…Based on the experiment, the proposed algorithm outperforms the suffix tree in the length of observed paragraph below one hundred words.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The experimental results show that combining the advantages of the geometric based validation and contrast based filtering as well as avoiding large quantization errors, lead to significant enhancement in the performance of the seed point detection algorithm in terms of balancing between the precision and recall. …”
Get full text
Get full text
Thesis -
6
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
7
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for a multicast-based mobile IPv6 network, such that the branches of the tree constitute the shortest paths from the packet source to each of the visited locations. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
10
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…A cluster pattern of landslide locations was extracted in previous study using nearest neighbor index (NNI), which were then used to identify the clustered landslide locations range. …”
Get full text
Get full text
Conference or Workshop Item -
11
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
12
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
13
Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones
Published 2020“…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
Get full text
Get full text
Thesis -
14
Implementation of machine learning algorithms for streamflow prediction of Dokan dam
Published 2023“…This study aims at comparing the application of deep learning algorithms and conventional machine learning algorithms for predicting reservoir inflow. …”
text::Thesis -
15
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…This protocol depends on the location information of the multicast members which is obtained using a location service algorithm. …”
Get full text
Get full text
Article -
16
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
17
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
18
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023text::Thesis -
19
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
text::Thesis -
20
Advanced Processing of UPM-APSB’s AISA Airborne Hyperspectral Images for Individual Timber Species Identification and Mapping
Published 2007“…Image processing was carried out in two steps, namely data conversion from radiance units to reflectance using a radiative transfer method and application of the mapping algorithm, specifically designed for identifying superficial materials based on similarities between image pixels and spectra from a spectral library of timber species. …”
Get full text
Get full text
Get full text
Article
