Search Results - (( basic detection using algorithm ) OR ( using communication using algorithm ))
Search alternatives:
- using communication »
- communication using »
- basic detection »
- using algorithm »
-
1
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…E-mail is used for communication between strangers and friends. …”
Get full text
Get full text
Research Reports -
2
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
3
Mobile Robot with Navigation Control and Communication
Published 2016“…The purpose of using V-Methodology is to prevent problem that might occur in future which it can be detected earlier during the Testing of Subsystem.…”
Get full text
Get full text
Final Year Project -
4
Development of land target following system of hexacopter
Published 2015“…This paper discussed the development of a land target following system for hexacopter using on-board camera. The camera will detect the specified land target during the flight of the hexacopter and communicate with the base station to produce the GPS location of the target for necessary actions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Visual tracking and servoing of human face for robotic head Amir-II
Published 2010“…The algorithm basically compares the locations of the face in the image plane that is detected from the static face image captured from real-time video stream. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…However, the basic idea is the same - the total bandwidth is sensed using coarse resolution energy detection, then, fine sensing is applied to the portion of interest. …”
Get full text
Get full text
Thesis -
9
-
10
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
11
Active contour model on digital mammograms using low-cost parallel computing systems
Published 2009“…In this system four processors are used that communicate via Ethernet network using LINUX as the operating system and Matlab Distributed Computing Engine (MDCE) as a platform to process the digital mammograms. …”
Get full text
Book Section -
12
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
Article -
13
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Multiview face emotion recognition using geometrical and texture features
Published 2017“…A 3D face pose estimation algorithm detects head rotations of Yaw, Roll and Pitch for emotion recognition. …”
Get full text
Get full text
Get full text
Thesis -
16
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
Published 2014“…These devices are capable of sensing certain changes of incidents or parameters and of communicating with other devices. WSNs could be very useful for providing support for some specific purposes, such as target tracking, surveillance, environmental monitoring, etc. …”
Get full text
Get full text
Get full text
Book Chapter -
17
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005Get full text
Get full text
Final Year Project -
18
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Design and development of iRemote Terminal Unit (iRTU) for undervoltage and overvoltage fault
Published 2014“…The purpose of this research is to design an iRTU hardware circuit board, develop the iRTU using software algorithms, create the interfacing for monitoring process and integrate software and hardware together to make the iRTU as a complete system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…The technique utilizes the narrow phase approach in detecting collision detection of non-convex object by testing collision between basic primitive and polygon. …”
Get full text
Get full text
Thesis
