Search Results - (( its application learning algorithm ) OR ( from location based algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- its application »
- from location »
-
1
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
2
Quasi oppositional—Manta ray foraging optimization and its application to pid control of a pendulum system
Published 2022“…MRFO is relatively a single objective optimization algorithm. It was inspired from the behavior of a cartilaginous fish called Manta Ray. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
High Accuracy Estimation Of Head Yaw Using Bounding Box Algorithm On A Vision Based System
Published 2020“…In a face-to-face interaction, most applications use vision sensors such as camera as an input to the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023text::Thesis -
5
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
6
Autonomous person-following telepresence robot using monocular camera and deep learning YOLO
Published 2024“…For robot movement control, a region-based controller is proposed to enable the robot to move based on the detected person's location in the image captured by the camera. …”
Get full text
Get full text
Get full text
Article -
7
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…Industrial visual machine inspection system uses template or feature matching methods to locate or inspect parts or pattern on parts. These algorithms could not compensate for the change or variation on the inspected parts dynamically. …”
Get full text
Get full text
Thesis -
8
Autonomous Person-following Telepresence Robot Using Monocular Camera And Deep Learning Yolo
Published 2024Get full text
journal::journal article -
9
Development of predictive modeling and deep learning classification of taxi trip tolls
Published 2022“…Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
Get full text
Get full text
Get full text
Article -
10
Precision agriculture for corn using reinforcement learning
Published 2024“…Beyond data access, RACKY incorporates a sophisticated reinforcement learning agent based on the Proximal Policy Optimization (PPO) algorithm within the SWATGym. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Estimating the un-sampled ph value via neighbouring points using multi-layer neural network - genetic algorithm
Published 2023“…MLNNGA and MLNN-BP are inputted with four pH values from distant adjacent locations on a similar basin. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Multi leader particle swarm optimization for optimal placement and sizing of multiple distributed generation for a micro grid
Published 2023“…A voltage stability index-based approach was adopted to establish the optimal locations of the DGs in the system. …”
text::Thesis -
13
Precision agriculture for corn using reinforcement learning
Published 2024“…Beyond data access, RACKY incorporates a sophisticated reinforcement learning agent based on the Proximal Policy Optimization (PPO) algorithm within the SWATGym. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Development of damage identification scheme using de-noised modal frequency response function data with artificial neural network / Mohamad Izzudin Hussein Shah
Published 2018“…Damaged identification scheme is used to monitor and locate the damage on a structure. Vibration based damage identification scheme which utilise vibrational modal data is popular due to its non-destructive nature. …”
Get full text
Get full text
Thesis -
15
A systematic review on emperor penguin optimizer
Published 2021“…Firstly, EPO has low learning curve (i.e., based on the simple analogy of huddling behavior of emperor penguins in nature (i.e., surviving strategy during Antarctic winter). …”
Get full text
Get full text
Get full text
Article -
16
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Location-based applications enabled by advances in sensing and tracking technology but it also create significant privacy risks. …”
Get full text
Get full text
Thesis -
17
Estimating Missing Precipitation to Optimize Parameters for Prediction of Daily Water Level Using Artificial Neural Network
Published 2006“…The back propagation algorithm was adopted for this study. The optimal model for predicting missing data found in this study is the network with the combination of learning rate and the number of neurons in the hidden layer of 0.2 and 60. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
20
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article
