Search Results - (( basic detection system algorithm ) OR ( using identification using algorithm ))
Search alternatives:
- using identification »
- identification using »
- system algorithm »
- basic detection »
- using algorithm »
-
1
The development of virtual product life cycle design tool using artificial intelligence technique
Published 2008“…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
Get full text
Monograph -
2
Water Pollution Source Identification Based on Real-Time Monitoring System in Siak River
Published 2021“…There 6 sets of detection systems deployed around the river, especially in the heavy residential and industrial areas. …”
Get full text
Get full text
Conference or Workshop Item -
3
Designing an integrated AIOT system for tracking class attendance
Published 2024“…For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Vehicle Tracking using Video Cameras
Published 2013“…The „Vehicles Tracking System Using Video Cameras‟ is the basic solution to those problems. …”
Get full text
Get full text
Final Year Project -
5
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
6
Fault Detection Relevant Modeling of an Industrial Gas Turbine based on Neuro-Fuzzy Approach
Published 2010“…Analytical redundancy based fault detection and diagnosis system for an industrial gas turbine requires accurate model of the unit. …”
Get full text
Conference or Workshop Item -
7
Design and development of detection scheme using multiline image scanning for aerial mapping of a simulated rice paddy field and implemented on unmanned aerial vehicle / Mohamad Fa...
Published 2018“…A conventional analog camera as front end sensor was used in this work as it could provide vast raw image data that can be utilized to identify the captured image using the designed algorithm. …”
Get full text
Get full text
Thesis -
8
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
Published 2018“…An algorithm was used to verify filetypes by looking up a File Signature library to compare files’ header with their extension. …”
Get full text
Get full text
Thesis -
9
Design and development of detection scheme using multiline image scanning for aerial mapping of a simulated rice paddy field and implemented on unmanned aerial vehicle / Mohamad Fa...
Published 2018“…A conventional analog camera as front end sensor was used in this work as it could provide vast raw image data that can be utilized to identify the captured image using the designed algorithm. …”
Get full text
Get full text
Book Section -
10
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005Get full text
Get full text
Final Year Project -
11
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
Get full text
Get full text
Conference or Workshop Item -
12
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
13
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
14
Real-time system for facial emotion detection using GPSO algorithm
Published 2012Get full text
Working Paper -
15
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…There are several limitations that facing intrusion-detection system in current days, such as high rates of false positive alerts, low detection rates of rare but dangerous attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Web Camera Application For Motion Detection
Published 2003“…The new method to detect motion is "vision motion detection". It is the artificial way of machine vision system compared to human's vision in detecting motion. …”
Get full text
Get full text
Thesis -
18
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
19
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
20
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…"Motion gesture is one of the gesture recognition algorithms which provide touchless interaction within a system. …”
Get full text
Get full text
Academic Exercise
