Search Results - (( program implementation function algorithm ) OR ( system detection system algorithm ))
Search alternatives:
- implementation function »
- program implementation »
- function algorithm »
- system detection »
- system algorithm »
-
1
IMAGE PROCESSING ALGORITHMS ON FPGA
Published 2007“…The chosen image processing algorithms are implemented on two systems which are Color Filtering System and Edge Detection System. …”
Get full text
Get full text
Final Year Project -
2
A real-time traffic sign recognition system for autonomous vehicle using Yolo / Nurul Paudziah Aida Mohd Paudzi
Published 2020“…The image processing technique has been chosen to be applied on developing this system where the project is the implementation of the deep learning technology using You Only Look Once (YOLO) algorithm to train the model for detection. …”
Get full text
Get full text
Thesis -
3
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…Finally, a set of experiments to validate the proposed algorithms has been conducted. The algorithms function with success rate from 74% up to 100% and could handle the orientation of a tilted object up to 45 degrees. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The implementation of embedded vision system could reduce the need for human video scanning and has the additional effect of a more reliable system. …”
Get full text
Thesis -
5
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…The results are then communicated between hardware circuit and simulation circuit for the final conclusion with the properly functional algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
Development of elasto-plastic viscous damper finite element model for reinforced concrete frames
Published 2014“…So based on all the developed components an especial finite computer program has been codified for “Nonlinear Analysis of Reinforced Concrete Buildings with Earthquake Energy Dissipation System”. …”
Get full text
Get full text
Article -
7
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
8
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
10
Object detection system using haar-classifier
Published 2009“…An algorithm for the design object detection systems is presented. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
Get full text
Get full text
Thesis -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
13
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
14
-
15
Detection of head position using chain code algorithm
Published 2007“…Human head detection is the first step of an autonomous human recognition system. …”
Get full text
Get full text
Thesis -
16
Detection of head position using chain code algorithm
Published 2007“…Human head detection is the first step of an autonomous human recognition system. …”
Get full text
Get full text
Thesis -
17
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
18
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
19
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
20
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Therefore, the aim of the study is to identify a fast, simple, and reliable method of FD on GCPV system in Malaysia. The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis
