Search Results - (( based location based algorithm ) OR ( rate information based algorithm ))
Search alternatives:
- information based »
- rate information »
- based location »
-
1
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
2
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
4
k- Nearest Neighbor Algorithm For Improving Accuracy In Clutter Based Location Estimation Of Wireless Nodes
Published 2013“…In step 2 we construct three triangles at random by using the data gathered in step 1 and calculate mean value of predicted locations. Finally based on locations calculated in step 2 we apply the k-NN algorithm to minimize error in the estimated location. …”
-
5
Design of information hiding algorithm for multi-link network transmission channel
Published 2019“…The average time spent on hiding information is 2.04 s, indicating that the algorithm has high information hiding rate and storage efficiency.…”
Get full text
Get full text
Get full text
Article -
6
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
7
An algorithm for pulsed activation of solenoid valves for variable rate application of agricultural chemicals
Published 2008“…A potential advantage of this alternative algorithm over pulse width modulation based systems is the use of lower-cost industrial solenoid valves with slower opening and closing times instead of the more expensive high speed valves normally used in PWM systems.…”
Get full text
Get full text
Conference or Workshop Item -
8
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
Get full text
Get full text
Thesis -
9
-
10
Data discovery algorithm for scientific data grid environment
Published 2005“…The algorithms we studied are based on the P2P architecture. …”
Get full text
Get full text
Get full text
Article -
11
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
12
Determination of the best single imputation algorithm for missing rainfall data treatment
Published 2016“…Based on the analysis, the proposed singular imputation algorithms, which treated missing data by geometric means, harmonic means and medians are more superior compared to the other imputation algorithms, irrespective of missing rates and rainfall stations.…”
Get full text
Get full text
Get full text
Article -
13
Determination of the Best Single Imputation Algorithm for Missing Rainfall Data Treatment
Published 2016“…Based on the analysis, the proposed singular imputation algorithms, which treated missing data by geometric means, harmonic means and medians are more superior compared to the other imputation algorithms, irrespective of missing rates and rainfall stations. …”
Get full text
Get full text
Get full text
Article -
14
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
Published 2022“…The authentication data is embedded into the original block location, while the recovery data is embedded into the distant location from the original location based on the block mapping algorithm. …”
Get full text
Get full text
Get full text
Article -
15
An efficient algorithm for oval shape face detection in color family photos
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm achieved an average of 87% precision, 83% of recall, 85% of F-score and 82% of accuracy rate.…”
Get full text
Get full text
Thesis -
17
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…Finally, a set of experiments to validate the proposed algorithms has been conducted. The algorithms function with success rate from 74% up to 100% and could handle the orientation of a tilted object up to 45 degrees. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
Published 2022“…The authentication data is embedded into the original block location, while the recovery data is embedded into the distant location from the original location based on the block mapping algorithm. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A network based fetal ECG monitoring algorithm
Published 2011Get full text
Get full text
Get full text
Article
