Search Results - (( developing positive detection algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Many machine learning techniques have been developed to cope with this problem. These machine learning algorithms develop a detection model in a training phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Development of Real-Time Eye Tracking Algorithm by Anwar, S.N.S.S., Aziz, A.A., Adil, S.H.

    Published 2021
    “…This project develops a real-time eye tracking algorithm to improve the accuracy of iris detection and gaze classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application by Wan Nor Afiqah, Wan Othman

    Published 2016
    “…As a result, this application can detects real time kids‟ position with acceptable time but not in accuracy due to some signal problem of Wi-Fi access point.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5
  6. 6
  7. 7

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection by Sze Sin, Voon, Kho, Lee Chin, Ngu, Sze Song, Annie, Joseph, Kuryati, Kipli

    Published 2024
    “…This paper proposes an autonomous positioning model for Unmanned Aerial Vehicles (UAVs) that can detect power line insulators on transmission lines to address this need. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Landmark detection for vision based of autonomous guided vehicle by Nurul Atiqah Syazwani, Kamarudin

    Published 2012
    “…The algorithm is developed not only to detect and recognize but also to distinguish landmark from non-landmark. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Computer algorithm for automated detection of intramedullary rod hole position and orientation / Ahmad Zulhilmi Mohd Ziyadi by Mohd Ziyadi, Ahmad Zulhilmi

    Published 2014
    “…It is achieve by using special algorithm that detect holes 2D coordinates and average width of intramedullary rod. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Face detection and stereo matching algorithms for smart surveillance system with IP cameras by Abd Manap, Nurulfajar

    Published 2010
    “…This work involves video analytics for estimating the location of the object in a 3D environment and transmitting its positional coordinates to the PTZ camera. The research consists of algorithm development in surveillance system including face detection, stereo matching, location estimation and implementation with ACTi PTZ camera. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The first modification enhances the initial population of the MBGWO using a heuristic based Ant Colony Optimisation algorithm. The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
    Get full text
    Get full text
    Thesis
  15. 15

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20