Search Results - (( develop being detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- being detection »
- develop being »
-
1
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
Get full text
Get full text
Thesis -
2
-
3
Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus
Published 2017Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Monograph -
7
-
8
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…The effect of video quality on human detection rate is discussed in Chapter 4. In a human detection, the software is represented by algorithms, in which algorithm also being used in the process of training the dataset. …”
Get full text
Get full text
Final Year Project -
9
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
10
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
Get full text
Get full text
Get full text
Article -
11
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Thesis -
12
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
13
COMPUTERIZED SEGMENTATION OF SINUS IMAGES
Published 2009“…Multilevel thresholding algorithms were developed to segment the images into meaningful regions for the detection of sinusitis. …”
Get full text
Get full text
Final Year Project -
14
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
15
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
16
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Autonomous Fire Fighting Mobile Platform
Published 2012“…Development work done to date on the platform has shown its feasibility of being an autonomous unit to monitor a prescribed area, detect for fire and extinguish the flame.…”
Get full text
Get full text
Conference or Workshop Item -
18
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A hyperbola-pair based lane detection system for vehicle guidance
Published 2010“…Real time image sequences are used as inputs, which after being processed are used for lanes detection. The lanes are detected using Hough transform and fitted to a hyperbola model. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Analysis Of Human Detection Method In Social Distancing Monitoring
Published 2022“…In the area of detection, several methods are being used either traditional or modern technology. …”
Get full text
Get full text
Undergraduates Project Papers
