Search Results - (( java application optimisation algorithm ) OR ( parameter detection matching algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- parameter detection »
- java application »
- matching »
-
1
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…The quantitative results show that the ORB and SURF algorithms detect and match more features than other algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
3
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
4
Segmentation of Malay syllables in connected digit speech using statistical approach
Published 2008“…This paper reports the finding of segmentation experiment using four criterions ie. the insertion, omissions, accuracy and segmentation match between the algorithms. The result shows that divergence algorithm performed only slightly better and has opposite effect of the testing parameter p and L compared to Brandt’s GLR. …”
Get full text
Get full text
Get full text
Article -
5
Object Localization In 3D Point Cloud
Published 2020“…In the final localization step, with the adjustment of the parameters, the result shows that this algorithm was able to correctly localize all input models from the scene point cloud, achieving a 100% localization accuracy.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…Integration of the proposed artefact detection technique into remote monitoring devices could enhance reliability of the PPG-derived physiological parameters.…”
Get full text
Get full text
Article -
8
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
Get full text
Get full text
Article -
10
A generalized mixed model framework for assessing fingerprint individuality in presence of varying image quality
Published 2014“…We develop algorithms based on the Laplace approximation of the likelihood and infer the unknown parameters based on this approximate likelihood. …”
Get full text
Get full text
Article -
11
-
12
An automated approach for analysis of Fourier Transform Infrared (FTIR) spectra of edible oils
Published 2012“…This paper reports a computational approach for analysis of FTIR spectra where peaks are detected, assigned and matched across samples to produce a peak table with rows corresponding to samples and columns to variables. …”
Get full text
Get full text
Get full text
Article -
13
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
14
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
15
A robust traffic quantity measurement with video surveillance
Published 2011“…The method consists of three algorithms. First, background modeling and update, second, a boosting method to enhance the foreground image and reduce the noise and at last determining best match of region of interest (ROI) to extract information to conclude if there is a vehicle in the detection zone or not. …”
Get full text
Get full text
Article -
16
Nonlinear vibration based modeling for damage detection of reinforced concrete beams / Muhammad Usman Hanif
Published 2018“…The nonlinear behavior, in the form of nonlinear vibration characteristics, was used in proposing a damage detection algorithm which doesn’t rely on the baseline data of the structure. …”
Get full text
Get full text
Get full text
Thesis -
17
The development of Muscle Fatigue Prediction model from muscle torque and contraction data / Keshasni Earichappan
Published 2023“…The average MC and torque data were set as input parameters and binary formed fatigue levels were set as output parameters. …”
Get full text
Get full text
Get full text
Thesis -
18
Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Evaluating and predicting overall equipment effectiveness for deep water disposal pump using ANNGA analysis approach / Soud Al-Toubi, Babakalli Alkali, David Harrison and Sudhir C....
Published 2023“…Analysis of ANOVA (variance) was adopted as an additional decision tool for detecting the variation of process parameters. ANN-GA results showed that the current OEE value ranges between 29% to 54%, whereas the predicted future system performance average is approximately 49%, which reflects the poor performance of the DWD pump system in the future compared to the worldclass target (85%). …”
Get full text
Get full text
Get full text
Article -
20
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…For comparison purpose, the other approach of counting trees was carried out; the commercial eCognition software was tested for oil palm counting in template matching approach. The overall accuracy of counting existing oil palm trees using the approach developed in this study is 93.3% while missing trees detection gives the detection accuracy of 89.2%. …”
Get full text
Get full text
Thesis
