Search Results - (( testing detection system algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- testing detection »
- implication force »
- system algorithm »
- java implication »
- force algorithm »
-
1
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
2
Real time power quality event detection using continuous wavelet transform
Published 2023Subjects:Conference paper -
3
Fault detection with optimum March Test Algorithm
Published 2012“…This paper analyzes MATS++(6N), March C-(10N), March SR(14N), and March CL(12N) test algorithms and shows that they cannot detect either Write Disturb Faults (WDFs) or Deceptive Read Destructive Faults (DRDFs) or both. …”
Get full text
Conference or Workshop Item -
4
-
5
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. The result of testing the hardware system of the automatic system shows its reliability and flexibility to provide accurate movements in two degrees of freedom as well as its dependability and system protection. …”
Get full text
Get full text
Thesis -
6
Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi
Published 2020“…This paper aims to discuss about the project built for encountering that problems to detect and classify the snakes. Objectives of this project is to design the flow of the system, developed in Window application and test the functionality of the system and reliability for the predictive model. …”
Get full text
Get full text
Thesis -
7
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis -
8
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Detection of head position using chain code algorithm
Published 2007“…Human head detection is the first step of an autonomous human recognition system. …”
Get full text
Get full text
Thesis -
10
Detection of head position using chain code algorithm
Published 2007“…Human head detection is the first step of an autonomous human recognition system. …”
Get full text
Get full text
Thesis -
11
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
Get full text
Get full text
Get full text
Article -
12
Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli
Published 2023“…For this project, there are two types of testing were conducted: functionality testing of the performance of the entire system and metric evaluation to evaluate the accuracy of the object detection model. …”
Get full text
Get full text
Thesis -
13
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…This detection system must differentiate between normal data and abnormal or hacker-generated data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
18
Real-time system for facial emotion detection using GPSO algorithm
Published 2012Get full text
Working Paper -
19
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal
