Search Results - (( based detection method algorithm ) OR ( program implementation using algorithm ))
Search alternatives:
- program implementation »
- implementation using »
- method algorithm »
- based detection »
- using algorithm »
-
1
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020“…The purpose of this thesis is to implement an algorithm for drone-based square boundaries using Python and OpenCV. …”
Get full text
Get full text
Monograph -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. The third one is to evaluate the accuracy of the k Nearest Neighbors algorithm in the classification credit card holder behavior. …”
Get full text
Get full text
Thesis -
4
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…In this study, the method used is K-Means to perform clustering based on area grouping. …”
Get full text
Get full text
Book Section -
5
Moving detection using cellular neural network (CNN)
Published 2008“…The algorithm created is used to detect the ball in the images. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
7
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The prototype is evaluated based on distance between initial position and selected marble position. …”
Get full text
Get full text
Thesis -
8
-
9
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
10
-
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60
Published 2009“…Over the past few years, r esearchers have come up with various algorithms and method in detecti ng human skin colour. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Image processing on intel edison microcontroller for pork detection
Published 2016“…In this research, implementing image processing techniques based on Intel Edison platform is used to handle CVD problem and decrease the detection cost. …”
Get full text
Get full text
Thesis -
14
Self routing traffic light for traffic light controller using priority method based on volume of vehicles
Published 2015“…In the sensor demand method, it is based on real time sensor detection where loop sensors are placed under certain road junctions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Facial age range estimation using geometric ratios and hessian-based filter wrinkle analysis
Published 2016“…The Hessian-Based Filter is used to enhance wrinkle analysis for age range estimation method. …”
Get full text
Get full text
Get full text
Thesis -
17
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…Materials and Methods: We used hyperspectral reflectance data from healthy and FLS of soybeans. …”
Get full text
Get full text
Get full text
Article -
18
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
19
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis
