Search Results - (( war classification using algorithm ) OR ( pattern detection path algorithm ))
Search alternatives:
- classification using »
- war classification »
- pattern detection »
- using algorithm »
- detection path »
- path algorithm »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
2
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
4
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In conclusion, hybrid classification as a combination of k-means and support vector machine algorithms and post-classification comparison change detection technique can be used to monitor land cover changes in Halabja city, Iraq. …”
Get full text
Get full text
Thesis -
5
Monitoring Land Cover Changes in Halabja City, Iraq.
Published 2013“…Quantitative analysis was conducted by using post-classification change detection technique. …”
Get full text
Get full text
Get full text
Article -
6
Context enrichment framework for sentiment analysis in handling word ambiguity resolution
Published 2024“…Machine learning algorithms are deployed to perform sentiment classification. …”
Get full text
Get full text
Thesis -
7
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
8
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
9
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
Get full text
Get full text
Conference or Workshop Item
