Search Results - (( java implementation model algorithm ) OR ( frames detection sensor algorithm ))
Search alternatives:
- implementation model »
- java implementation »
- frames detection »
- detection sensor »
- sensor algorithm »
- model algorithm »
-
1
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
A monocular view-invariant fall detection system for the elderly in assisted home environments
Published 2011“…An ensemble of pose models performs inference on each video frame. Each pose model employs an expectation-maximization algorithm to estimate the probability that the given frame contains the corresponding pose. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Web Camera Application For Motion Detection
Published 2003“…There are many different ways to detect motion. The conventional way is by using either active sensor or passive sensor. …”
Get full text
Get full text
Thesis -
5
Vision-Based Autonomous Vehicle Driving Control System
Published 2005“…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
Get full text
Get full text
Thesis -
6
Vision-based autonomous vehicle driving control system
Published 2005“…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
Get full text
Get full text
Thesis -
7
Zero acceleration algorithm with state of motion identifier for position estimation of wheeled robot
Published 2019“…The proposed framework consists of zero acceleration algorithm which responsible to detect the time and duration of a wheeled robot when it is travelling at constant speed (zero acceleration), zero velocity update to detect the still phase of the wheeled robot and improved drift correction. …”
Get full text
Thesis -
8
Development of obstable avoidance system for 3D robot navigation
Published 2024“…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
10
Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle
Published 2017“…In this paper, combination of both sensors based is proposed for a small UAV obstacle detection system. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Region Detection Technique Using Image Subtraction and Pixel Expansion Cue for Obstacle Detection System on Small – Sized UAV
Published 2024“…: This research paper is about method of detection of free region and obstacle region by combining image segmentation and frame subtraction method. …”
Get full text
Get full text
Get full text
Article -
12
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
13
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…The algorithm used for feature detection and description is Oriented-FAST Rotated-BRIEF (ORB), whereas to evaluate the homography for pose estimation, Random Sample Consensus (RANSAC) is used. …”
Get full text
Get full text
Get full text
Article -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
15
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
16
Around view monitoring system with motion estimation in ADAS application
Published 2019“…The algorithm to be tested is Gunnar Farneback. Movement in sequential frames is detected and converted to the real-world position change. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Passive client-centric rogue access point detection framework for WiFi hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Thesis -
18
-
19
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
