Search Results - (( developing positive detection algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- developing positive »
- stemming algorithm »
- java application »
-
1
Machine learning algorithms in context of intrusion detection
Published 2016“…Many machine learning techniques have been developed to cope with this problem. These machine learning algorithms develop a detection model in a training phase. …”
Get full text
Get full text
Conference or Workshop Item -
2
Development of Real-Time Eye Tracking Algorithm
Published 2021“…This project develops a real-time eye tracking algorithm to improve the accuracy of iris detection and gaze classification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application
Published 2016“…As a result, this application can detects real time kids‟ position with acceptable time but not in accuracy due to some signal problem of Wi-Fi access point.…”
Get full text
Get full text
Undergraduates Project Papers -
4
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
5
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
6
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…Then, the percentage of detection accuracy was used to compare the detection performance of all five algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection
Published 2024“…This paper proposes an autonomous positioning model for Unmanned Aerial Vehicles (UAVs) that can detect power line insulators on transmission lines to address this need. …”
Get full text
Get full text
Get full text
Article -
9
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
10
Landmark detection for vision based of autonomous guided vehicle
Published 2012“…The algorithm is developed not only to detect and recognize but also to distinguish landmark from non-landmark. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Computer algorithm for automated detection of intramedullary rod hole position and orientation / Ahmad Zulhilmi Mohd Ziyadi
Published 2014“…It is achieve by using special algorithm that detect holes 2D coordinates and average width of intramedullary rod. …”
Get full text
Get full text
Thesis -
12
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
13
Face detection and stereo matching algorithms for smart surveillance system with IP cameras
Published 2010“…This work involves video analytics for estimating the location of the object in a 3D environment and transmitting its positional coordinates to the PTZ camera. The research consists of algorithm development in surveillance system including face detection, stereo matching, location estimation and implementation with ACTi PTZ camera. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The first modification enhances the initial population of the MBGWO using a heuristic based Ant Colony Optimisation algorithm. The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
15
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
Get full text
Get full text
Thesis -
16
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
19
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
A new intelligent multilayer framework for insider threat detection
Published 2021“…Subsequently, using the K-Nearest Neighbors algorithm, an anomaly insider threat detection algorithm has been developed. …”
Get full text
Get full text
Get full text
Article
