Search Results - (( java implication based algorithm ) OR ( software detection cloud algorithm ))
Search alternatives:
- software detection »
- implication based »
- java implication »
- cloud algorithm »
-
1
Facial mask detection in low light environment
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
2
-
3
-
4
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
5
Network tool for preventing DDOS attacks on cloud computing
Published 2015Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
Published 2018“…The current results represent a feasible outcome for a good intrusion detection and prevention framework for DDoS-cloud computing systems based on statistics and predicted techniques. …”
Get full text
Get full text
Get full text
Book Chapter -
7
Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim
Published 2018“…Then, the image was being processed in the photogrammetry software to produce the orthomosaic and point cloud data. …”
Get full text
Get full text
Thesis -
8
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…In this invention, if a person falls, the action can be detected because there are several sensors to detect movement. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Android: S-Based Technique in Mobile Malware Detection
Published 2018Get full text
Get full text
Get full text
Article -
10
Human presence detection system
Published 2024“…Rigorous testing and experimentation were conducted to establish the most effective delay interval, ensuring reliable detection while minimizing false alarms. Additionally, the development of an automated calculation algorithm streamlines the testing process and enhances data collection efficiency. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
-
13
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The data stored in the cloud can be retrieved and processed using ThingSpeak software as this software allow user to aggregate, visualize, and analyze live data streams in the cloud. …”
Get full text
Get full text
Monograph -
14
Vehicle detection system using tunnel magnetoresistance sensor
Published 2018“…With the combinations of software filter and state machine’s algorithm, the occupancy of the car park can be identified with high accuracy. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
15
-
16
Real-time personal protective equipment compliance detection using you only look once
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement
Published 2014“…The contours of the segmented region are extracted to generate the cloud of points (ℝ 3 ). Finally, generate three dimensions modelling for the segmented cavity by developing the normal feature approximation method for the cloud point, in order to accurately delineate the required object. …”
Get full text
Get full text
Thesis -
19
Smart room system with dual authentication
Published 2025“…It uses the Histogram of Oriented Gradients (HOG) algorithm for face recognition, which results in lower power consumption and faster processing. …”
Get full text
Get full text
Get full text
Article -
20
Depth value approximation of 2D complex-shape objects for 3D modelling using optical flow and trigonometry
Published 2015“…Future research may work on using the detected 3D point cloud as control points for texture coordinates to produce a fully texture mapped 3D model.…”
Get full text
Get full text
Thesis
