Search Results - (( based information flow algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Hardware development of ultrasonics tomography for composition determination of water and oil flow by Abdul Rahim, Ruzairi, Ng, Wei Nyap, Fazalul Rahiman, Mohd. Hafiz

    Published 2007
    “…The composition of the flow is determined based on the propagation time of the ultrasonic waves. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Treemap algorithm for dynamic stormwater infiltration movement into soil surface by Siti Nurbaidzuri, Binti Reli @ Raily, Izham, Mohamad Yusoff, Habibah, Lateh, Muhamad Uznir, Ujang

    Published 2015
    “…Tree algorithm is used to re-class and provides hierarchical depth of the soil where the depth are divided into five hierarchies (40cm, 80cm, 120cm, 160cm and 20cm) based on subsurface flow wetting range. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  6. 6

    Treemap algorithm for dynamic stormwater infiltration movement into soil surface by Reli, Siti Nurbaidzuri, Yusoff, Izham Mohamad, Lateh, Habibah, Ujang, Uznir

    Published 2015
    “…Tree algorithm is used to re-class and provides hierarchical depth of the soil where the depth are divided into five hierarchies (40cm, 80cm, 120cm, 160cm and 20cm) based on subsurface flow wetting range. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Imaging of solid flow in a gravity flow rig using infra-red tomography by Md. Yunus, Mohd. Amri

    Published 2005
    “…Information on flow regimes is vital in the analysis and measurement of industrial process flow. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Passive Two-Camera System to Generate a Depth Map of a Scene and Depth Estimation using Optical Flow Techniques. by Lee, Sooyong

    Published 2003
    “…Matlab scripts implementing optical flow algorithms were written. The optical flow for a motion sequence was computed and the vector field that shows both the direction and magnitude of the corresponding motion displayed.…”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15
  16. 16

    Mining sequence of event from vector-based spatiotemporal database by B.Y., Widodo

    Published 2007
    “…In this paper, we propose VectoFlowMiner, an extension to FlowMiner, a spatiotemporal data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An adaptive block-based matching algorithm for crowd motion sequences by Kajo, I., Kamel, N., Malik, A.S.

    Published 2018
    “…The proposed algorithm is based on block-based matching, particle advection, and social force model. …”
    Get full text
    Get full text
    Article
  19. 19

    An adaptive block-based matching algorithm for crowd motion sequences by Kajo, I., Kamel, N., Malik, A.S.

    Published 2018
    “…The proposed algorithm is based on block-based matching, particle advection, and social force model. …”
    Get full text
    Get full text
    Article
  20. 20

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
    Get full text
    Get full text
    Get full text
    Thesis