Search Results - (( peer detection method algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- using codification »
- codification using »
- method algorithm »
- using algorithm »
- peer detection »
-
1
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
2
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
3
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
-
10
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Outlier detection in circular regression model using minimum spanning tree method
Published 2019Get full text
Get full text
Conference or Workshop Item -
14
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
-
16
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
17
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
18
-
19
A study on advanced statistical analysis for network anomaly detection
Published 2005Get full text
Monograph -
20
