Search Results - (( developing partly detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing partly »
- implication based »
- partly detection »
- java implication »
-
1
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A machine vision system is use in many applications such as parts sortation, defect detection, object recognition and parts counting. …”
Get full text
Get full text
Conference or Workshop Item -
2
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A machine vision system is use in many applications such as parts sortation, defect detection, object recognition and parts counting. …”
Get full text
Get full text
Monograph -
3
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A machine vision system is use in many applications such as parts sortation, defect detection, object recognition and parts counting. …”
Get full text
Get full text
Thesis -
4
A cascading fuzzy logic with image processing algorithm-based defect detection for automatic visual inspection of industrial cylindrical object’s surface
Published 2018“…The image processing algorithm has been developed to extract the main features of the tested objects such as defects, borders, and noise. …”
Get full text
Get full text
Get full text
Article -
5
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
6
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
7
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
8
Human location estimation using thermopile array sensor
Published 2017“…Therefrom, an algorithm for early presence detection has been developed through the study of human body temperature behaviour with respect to the room temperature. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application
Published 2016“…The increasing number of missing kid from days to days is become main concern for parents. Hence, „Detecting Indoor Positioning of Moving Object using Wi-Fi Triangulation Algorithm for Kid Tracker Application‟ as a part of process in Kid Tracker Application to keep track our kids movement by focusing inside the building (shopping mall). …”
Get full text
Get full text
Undergraduates Project Papers -
10
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of sensor based transparent object handling using robot manipulator
Published 2024text::Final Year Project -
12
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…In this paper the result of an attempt to develop a substitute nonlinear model based on multilayer neural network (MLNN) and evolutionary algorithm (EA) for a single-shaft gas turbine having IGVs and VSVs is presented. …”
Get full text
Conference or Workshop Item -
13
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…The experimental results show that Random Forest Algorithm achieved the highest detection accuracy of 94.6% with lowest false positive rate of 0.099.…”
Get full text
Get full text
Article -
14
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Connected components algorithm was implemented for insect detection and counting. …”
Get full text
Get full text
Thesis -
15
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
Article -
16
Automatic label removal from digitized weld radiographs
Published 2007“…An algorithm was developed to detect and remove labels printed onto weld radiographs before weld extraction algorithm or defect detection algorithm is applied. …”
Get full text
Get full text
Get full text
Article -
17
Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis
Published 2017“…For modified image, the altered blocks should have higher error potential compred to the remaining part of the image. The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR
Published 2013“…The first part is to detect and count the PV infected RBC from S-channel. …”
Get full text
Get full text
Final Year Project -
19
Car plate detection system
Published 2005“…This system was developed as a prototype to fulfill the requirement and prove the correctness of the algorithms used. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Edge detection techniques for iris recognition system
Published 2013“…To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. …”
Get full text
Get full text
Get full text
Proceeding Paper
