Search Results - (( java implementation matching algorithm ) OR ( peer detection method algorithm ))
Search alternatives:
- implementation matching »
- java implementation »
- method algorithm »
- peer detection »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
3
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
-
10
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Outlier detection in circular regression model using minimum spanning tree method
Published 2019Get full text
Get full text
Conference or Workshop Item -
14
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
-
16
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…During location estimation, current histogram of RSS at unknown location will be compared to the database. The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
17
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
18
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
19
-
20
A study on advanced statistical analysis for network anomaly detection
Published 2005Get full text
Monograph
