Search Results - (( developing state detection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- developing state »
- java application »
- state detection »
-
1
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…The performance of the drowsiness signs detection algorithm is fully dependent on the performance of the eye state detection and the mouth state detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
Focal and non-focal epilepsy localization: a review
Published 2018“…This study reviews many recently-proposed algorithms for detecting the focal epileptic seizures. …”
Get full text
Get full text
Get full text
Article -
4
Drowsy driver detection using Viola-Jones Algorithm / Wan Nurul Adlina Wan Sallehuddin ... [et al.]
Published 2021“…Thus, this research is proposed to develop a system to detect and alert drowsy driver by using Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Shot boundary detection based on orthogonal polynomial
Published 2019“…Finally, the support vector machine is utilized to detect hard transitions. In addition, a comparison between the proposed algorithm and other state-of-the-art algorithms is performed to reinforce the capability of the proposed work. …”
Get full text
Get full text
Get full text
Article -
6
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
Get full text
Get full text
Get full text
Thesis -
7
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…One YOLOv8 based model was developed for detecting and segmenting ginger plants in various growth states. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Feature selection in intrusion detection, state of the art: A review
Published 2016Get full text
Get full text
Article -
9
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The data from photodiode is read by LabVIEW software for further develop to obtain useful output data. The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…One YOLOv8 based model was developed for detecting and segmenting ginger plants in various growth states. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
12
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
An optimized test case generation technique for enhancing state-sensitivity partitioning
Published 2017“…Afterwards, a prioritization algorithm used for sorting the test cases so the first test case detects the highest number of mutants followed by the cases that kill its live mutants. …”
Get full text
Get full text
Get full text
Thesis -
14
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
Get full text
Get full text
Article -
16
Development of a steady state visual evoked potential (SSVEP)-based brain computer interface (BCI) system
Published 2007“…This paper describes the development of a synchronous, online brain computer interface (BCI) system based on detecting the steady-state visual evoked potential (SSVEP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Fuzzy Platform for Embedded Wearable EEG Seizure Detection in Ambulatory State
Published 2014“…Same is also true in the reverse fashion for a separate band of frequency that changes the energy levels from higher to lower when a patient goes from Normal to a Seizure state. This fact has been exploited in this paper and filter has been developed to isolate the seizure band. …”
Get full text
Get full text
Conference or Workshop Item -
18
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
text::Thesis -
19
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
20
