Search Results - (( between learning algorithm ) OR ((( patterns drops algorithm ) OR ( patterns path algorithm ))))
Search alternatives:
- learning algorithm »
- between learning »
- patterns drops »
- path algorithm »
- patterns path »
-
1
DEVELOPMENT AND TESTING OF UNIVERSAL PRESSURE DROP MODELS IN PIPELINES USING ABDUCTIVE AND ARTIFICIAL NEURAL NETWORKS
Published 2011“…It was found that (by the Group Method of Data Handling algorithm), length of the pipe, wellhead pressure, and angle of inclination have a pronounced effect on the pressure drop estimation under these conditions. …”
Get full text
Get full text
Thesis -
2
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…This paper discusses the operations of the proposed three stage cooperative IDS in detecting packet drop attacks. The comparison study between DGHN and the iterative, highly computational self organizing map (SOM) is also reviewed. …”
Get full text
Book Section -
3
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
End to end performance analysis over IP RAN network / Armi Shahran Mohamad
Published 2011“…The expected result from the test experiment is able to produce set of information such as uplink and downlink duration time, throughput downlink pattern comparison, bytes received comparison and data transfer time taken. …”
Get full text
Get full text
Thesis -
5
Simulation performance comparison of A*, GLS, RRT and PRM path planning algorithms
Published 2022“…In this study, four robust path planning algorithms, namely: Probabilistic Roadmaps (PRMs), A-star, the Rapidly Exploring Random Trees (RRTs), and Generalized Laser Simulator (GLS), were simulated and their performance was measured and compared according to the total path distance covered, search time and path smoothness. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
7
A Scalable Algorithm for Constructing Frequent Pattern Tree
Published 2014“…Frequent Pattern Tree (FP-Tree) is a compact data structure of representing frequent itemsets. …”
Get full text
Get full text
Get full text
Article -
8
Scheduling of batch process plant / Abdul Aziz Abu Bakar
Published 1995“…Batch production is used throughout the process industries for the manufacture of fine chemical, plastics, pharmaceuticals, paints, ceramics, cosmetics, or whatever production quantities are small, product value is very high or product demand pattern is changeable. This research work is devoted to software development of scheduling and control algorithm of batch process plant using shortest path method developed by Dijkstra and K* shortest path method developed by Jin Y. …”
Get full text
Get full text
Student Project -
9
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…Additionally, we find that some algorithms are more sensitive to data leakage than others, as seen by the drop in model accuracy when built without leakage. …”
Get full text
Get full text
Article -
10
-
11
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…Each drop when falling in high speed will create a streak motion blurred illusion based on the background intensity that reflects the environment creating higher intensity pattern in an image. …”
Get full text
Get full text
Thesis -
12
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
13
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
14
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
15
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…The repeatability tests shown that the developed navigation algorithm able the robot to reach the target with the similar navigation path pattern outcome in each simulation tests. …”
Get full text
Get full text
Thesis -
16
A comparative sales forecast study between supervised and unsupervised learning algorithm on restaurant / Azhar Tamby
Published 2006“…In this research, there are two algorithm of neural network will be used. It is coming from supervised and unsupervised learning algorithm. …”
Get full text
Get full text
Student Project -
17
-
18
Land Use Changes in Jeli, Kelantan
Published 2013“…The highest dropped in forest area was in 2004 with a decrease of -0.76% from the year before. …”
Get full text
Undergraduate Final Project Report -
19
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…Pheromone concept is the main criterion that distinguish ACO to other algorithms. Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
Get full text
Get full text
Thesis -
20
Destination prediction based on past movement history
Published 2020“…Matching of the history with the user's movement is done through a simple pattern recognition technique. The system includes an algorithm that simulates incoming data from a user and matches on a window by window basis to the history. …”
Get full text
Thesis
