Search Results - (( based detection method algorithm ) OR ( program implementation based algorithm ))
Search alternatives:
- program implementation »
- implementation based »
- method algorithm »
- based detection »
-
1
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020“…The purpose of this thesis is to implement an algorithm for drone-based square boundaries using Python and OpenCV. …”
Get full text
Get full text
Monograph -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…The results show that the Case-Based Reasoning model has a great potential to be implemented in diagnosing Thalassaemia cases.…”
Get full text
Get full text
Undergraduates Project Papers -
3
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…In this study, the method used is K-Means to perform clustering based on area grouping. …”
Get full text
Get full text
Book Section -
4
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. The third one is to evaluate the accuracy of the k Nearest Neighbors algorithm in the classification credit card holder behavior. …”
Get full text
Get full text
Thesis -
5
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
6
Moving detection using cellular neural network (CNN)
Published 2008“…Ten images are selected to be used in this project. The algorithm created is used to detect the ball in the images. …”
Get full text
Get full text
Undergraduates Project Papers -
7
-
8
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
9
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The prototype is evaluated based on distance between initial position and selected marble position. …”
Get full text
Get full text
Thesis -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…This research presents a design and development of robotic system based on LEGO Mindstorm kit. The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60
Published 2009“…Over the past few years, r esearchers have come up with various algorithms and method in detecti ng human skin colour. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Image processing on intel edison microcontroller for pork detection
Published 2016“…In this research, implementing image processing techniques based on Intel Edison platform is used to handle CVD problem and decrease the detection cost. …”
Get full text
Get full text
Thesis -
14
Self routing traffic light for traffic light controller using priority method based on volume of vehicles
Published 2015“…In the sensor demand method, it is based on real time sensor detection where loop sensors are placed under certain road junctions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Facial age range estimation using geometric ratios and hessian-based filter wrinkle analysis
Published 2016“…The Hessian-Based Filter is used to enhance wrinkle analysis for age range estimation method. …”
Get full text
Get full text
Get full text
Thesis -
16
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…Furthermore, reliefF-Gradient boosting and random forest algorithms achieved promising overall accuracy of 97.4% and 96.9%, respectively after implementing filtering and feature selection techniques. …”
Get full text
Get full text
Get full text
Article -
18
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
19
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
20
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…The objective of this paper is to describe the implementation of autonomous navigation through the use of event-driven programming technique which was based on finite state machines (FSM). …”
Get full text
Get full text
Conference or Workshop Item
