Search Results - (( waste reduction method algorithm ) OR ( pattern detection path algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Development of novel algorithm features in the modelling of cyclic processes by Choong, Thomas S.Y., Paterson, William R., Scott, David M.

    Published 2002
    “…The second feature of the algorithm is a reduction of the number of cycles required to reach the CSS while ensuring that the CSS is certainly determined. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    The effect of government policy on the relationship between organizational factors and construction waste management in Abuja, Nigeria by Nasidi, Yusuf

    Published 2016
    “…The study suggested that hazardous waste, time and overrun waste should also be considered; while case study or qualitative method could be adopted in future research.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Applying machine learning and particle swarm optimization for predictive modeling and cost optimization in construction project management by almahameed, Bader aldeen, Bisharah, Majdi

    Published 2024
    “…Particle Swarm Optimization (PSO) has demonstrated its efficacy in addressing the issue of construction waste reduction and enhancing the accuracy of cost estimation through the identification of optimal combinations of variables. …”
    Get full text
    Get full text
    Article
  13. 13

    The classification of FTIR plastic bag spectra via label spreading and stacking by Almanifi, Omair Rashed Abdulwareth, Ng, Jee Kwan, Anwar P. P., Abdul Majeed

    Published 2021
    “…Four pipelines were investigated, consisting of two machine learning algorithms, a stacked model that stacks the KNN, SVM and RF algorithms together, and Label spreading, as well as two different dimensionality reduction methods namely; SVD and UMAP. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Snort-based smart and swift intrusion detection system by Olanrewaju, Rashidah Funke, Khan, Burhan Ul Islam, Najeeb, Athaur Rahman, Ku zahir, Ku Nor Afiza, Hussain, Sabahat

    Published 2018
    “…In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network attacks in less time after monitoring incoming traffic thus maintaining better performance. Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15