Search Results - (( does detection using algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- implication force »
- java implication »
- using algorithm »
- force algorithm »
- does detection »
-
1
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
2
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
3
Continuous collision detection for virtual environments: A walkthrough of techniques
Published 2011“…While DCD requires backtracking after collision has been detected, CCD does not suffer the same problems as DCD. …”
Get full text
Get full text
Get full text
Article -
4
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…The algorithm does not employ any amplitude features in the detection process and employs only frequency features of the sEMG signal; therefore it is amplitude independent and can detect muscle activities in signals that have low signal to noise ratio. …”
Get full text
Get full text
Conference or Workshop Item -
5
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Currently, academic literature does not really cover the topic of unsupervised machine learning techniques for anomaly detection. …”
Get full text
Get full text
Article -
6
Evaluation of fall detection classification approaches
Published 2012“…Results show that the Multilayer Perceptron algorithm is the best option among other mentioned algorithms, due to its high accuracy in fall detection.…”
Get full text
Get full text
Conference or Workshop Item -
7
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
8
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Drowsy driver detection using Viola-Jones Algorithm / Wan Nurul Adlina Wan Sallehuddin ... [et al.]
Published 2021“…Viola-Jones algorithm is used to detect driver’s face and eyes in real time. …”
Get full text
Get full text
Get full text
Article -
10
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
Get full text
Get full text
Thesis -
11
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
12
Broken Conductor Detection on Power Distribution Feeder
Published 2013“…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article -
13
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
14
High Impedance Fault Detection on Power Distribution Feeder
Published 2012“…This paper presents an intelligent algorithm using a Takagi Sugeno-Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect high impedance fault. …”
Get full text
Get full text
Get full text
Article -
15
Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan
Published 2005“…Detection of a network intrusion and manual response without any further action does create a problem known as time gap. …”
Get full text
Get full text
Thesis -
16
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
18
Automated threshold detection for object segmentation in colour image
Published 2016“…In solving this issue, this paper presents an Automated Threshold Detection Algorithm, H(•). The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Using a novel algorithm in ultrasound images to detect renal stones
Published 2021“…Expectation–Maximization algorithm is a novel method used by us for the first time for identifying renal stones. …”
Get full text
Get full text
Get full text
Proceedings -
20
Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model
Published 2013“…This paper proposes an intelligent algorithm using the Takagi Sugeno- Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article
