Search Results - (( based aggregation detection algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- aggregation detection »
- based aggregation »
- java implication »
-
1
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…However, many issues are explored in the clustered-based data aggregation and reduced data aggregation efficiency. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…Therefore, this thesis proposes a local-based SMA that enhances the accuracy of complex regions detection by focusing on these issues. …”
Get full text
Get full text
Get full text
Thesis -
3
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
4
Enhanced local disparity map algorithm segment-side window-based cost aggregation and refinement
Published 2025“…Accurate disparity map estimation is crucial for applications such as 3D reconstruction, autonomous navigation, and object detection. Local window-based cost aggregation often suffers from edge fattening and texture inconsistency. …”
Get full text
Get full text
Get full text
Article -
5
Detection of eye movements based on EEG signals and the SAX algorithm
Published 2018Get full text
Get full text
Conference or Workshop Item -
6
Stereo Matching Based On Absolute Differences For Multiple Objects Detection
Published 2019“…This article presents a new algorithm for object detection using stereo camera system. …”
Get full text
Get full text
Get full text
Article -
7
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
8
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…This study proposed a Conditional Hybrid Intrusion Detection (CHID) by combining the flow-based with packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
9
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
10
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…Addressing these challenges entails an efficient and robust object detection and recognition algorithm. This algorithm can deal with a crowd of multiple faces via a mobile camera carried by a mini drone, and performs realtime video processing. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…There are many time series data reduction methods, ranging from primitive data aggregation such as Rate of Change to sophisticated compression algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…Comparison of this framework continue in some of the state-of-the-arts algorithm in the literature and the results is outperformed based on the proposed algorithm experimental result.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
18
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018“…CBR applies experience and knowledge on existing cases of fault diagnosis to newly provided cases. The genetic algorithm aggregates and revises relevant cases to provide solutions to unknown cases. …”
Get full text
Get full text
Article -
19
Small target detection of Unmanned Aerial Vehicles based on GDWNet in the digital economy
Published 2025“…To address these issues, a novel UAV aerial image object detection model, GDWNet, is proposed. In the feature extraction stage, GDWNet adopts a multi-branch extraction and merging structure based on the Generalized Efficient Layer Aggregation Network to enhance feature representation and improve gradient flow within the network. …”
Get full text
Get full text
Get full text
Article -
20
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…In clustering techniques, finding the similarity or distance between objects, handled by metrics in Rn, plays a central role in community detection. Under this framework, different algorithms have been developed where the output relies on an exact distance calculated based on the objects’ features. …”
Get full text
Get full text
Article
