Search Results - (( java implementation force algorithm ) OR ( managers detection based algorithm ))
Search alternatives:
- implementation force »
- java implementation »
- managers detection »
- force algorithm »
- detection based »
-
1
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
2
-
3
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
Published 2012“…Firstly, we divide the malicious peers into six categories; secondly, we bring forward PeerMate, a malicious peers detection algorithm based on Multiscale Principal Component Analysis (MSPCA) and Quality of Reconstruction (QR), to detect malicious peers in reputation based P2P systems; finally, we show through simulations that PeerMate can detect malicious peers efficiently and accurately.…”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…The employment of peak detection algorithm is prominent in several clinical applications such as diagnosis and treatment of epilepsy patients, assisting to determine patient syndrome, and guiding paralyzed patients to manage some devices. …”
Get full text
Get full text
Conference or Workshop Item -
5
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Algorithm of the longest commonly consecutive word for plagiarism detection in text based document
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Testing static single cell faults using static and dynamic data background
Published 2011“…It is also shown that Mod March CL(12N) and Mod March SR(14N) with DB management can detect all Static Single Cell Faults based on the Bit-Oriented-Memories (BOM) test method. …”
Get full text
Get full text
Conference or Workshop Item -
8
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. Therefore, implementing the principle of the machine learning, which is training the classification algorithm will be perform to improve the detection accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
Published 2016“…It provides an algorithm to the discovery of error and duplicates entries in the data sets of existing data warehouse. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
Get full text
Get full text
Get full text
Thesis -
13
Design and analysis of management platform based on financial big data
Published 2023“…In addition, a financial data management platform based on distributed Hadoop architecture is designed, which combines MapReduce framework with the fuzzy clustering algorithm and the local outlier factor (LOF) algorithm, and uses MapReduce to operate in parallel with the two algorithms, thus improving the performance of the algorithm and the accuracy of the algorithm, and helping to improve the operational efficiency of enterprise financial data processing. …”
Get full text
Get full text
Get full text
Article -
14
SMART: a subspace based malicious peers detection algorithm for P2P systems
Published 2013“…Firstly, we define malicious peers and show their influence on the system performance. Secondly, based on Multiscale Principal Component Analysis (MSPCA) and control chart, a Subspace based MAlicious peeRs deTecting algorithm (SMART) is brought forward. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Scalability and performance in duplicate detection : relational vs. graph database
Published 2023“…As a result, they may not be effective in identifying and resolving duplicate data in certain use cases. Graph-based algorithms such as community detection, may prove beneficial as it can capture a more complex relationships between data. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran
Published 2023“…It uses YOLOv5 object detection and classification algorithm. This project uses the images of paper, plastic and metal gathered from Kaggle and GitHub dataset. …”
Get full text
Get full text
Thesis -
19
An early warning detection system of terrorism in indonesia from Twitter contents using naïve bayes algorithm
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI
Published 2019“…The results obtained after the centroid detection algorithm applied moiré fringe patterns produced, and it showed the algorithm manage to detect the centroid of the moiré fringe patterns and its coordinate value. …”
Get full text
Get full text
Monograph
