Search Results - (( mobile validation study algorithm ) OR ( early identification method algorithm ))*
Search alternatives:
- identification method »
- early identification »
- mobile validation »
- method algorithm »
-
1
Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues
Published 2024“…•Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
Get full text
Get full text
Get full text
Article -
2
Dynamic path planning algorithm in mobile robot navigation
Published 2011“…This study is focused on exploring the algorithm that avoids acute obstacles in the environment. …”
Get full text
Get full text
Conference or Workshop Item -
3
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
4
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Students can watch and observe through the elaboration of dynamic animation. Previous studies show that AV mobile study is still limited. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model
Published 2022“…As reported in many studies, real drill experiments have been conducted to validate the mobile crowd steering application. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
8
-
9
Identification of transformer fault based on dissolved gas analysis using hybrid support vector machine-modified evolutionary particle swarm optimisation
Published 2018“…It was found that the proposed hybrid SVM-Modified EPSO (MEPSO)-Time Varying Acceleration Coefficient (TVAC) technique results in the highest correct identification percentage of faults in a power transformer compared to other PSO algorithms. …”
Get full text
Get full text
Article -
10
Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga
Published 2022“…First, to investigate the methods used to address limitations associated with microbiome-based datasets in colorectal cancer identification using deep neural network algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING
Published 2018“…There is a need to develop a low cost automatic corrosion damage identification. This project focuses on early detection of pipelines and gas tanks corrosion in oil and gas. …”
Get full text
Get full text
Final Year Project -
12
Validation of vis-screen mobile application for easy vision test by general public: a pilot study
Published 2019Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
-
16
Analysis of banana plant health using machine learning techniques
Published 2024“…Recent research emphasizes the imperative nature of addressing diseases that impact Banana Plants, with a particular focus on early detection to safeguard production. The urgency of early identification is underscored by the fact that diseases predominantly affect banana plant leaves. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…The validation results show that Random Forest with 10-folds cross validation spitting dataset achieved 8 highest performance compared to benchmark study and two other classifiers. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
20
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. Most methods in the early work that detects outliers independently have been developed in field of Statistics. …”
Get full text
Get full text
Conference or Workshop Item
