Search Results - (( using detection technique algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- application sensor »
- java application »
- sensor algorithm »
- using detection »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
3
Fire Detection Algorithm using Image Processing Techniques
Published 2015“…The growth of fire is detected using sobel edge detection. Finally a colour based segmentation technique was applied based on the results from the first technique and second technique to identify the region of interest (ROI) of the fire. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Detection and extraction features for signatures images via different techniques
Published 2019“…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
Get full text
Get full text
Conference or Workshop Item -
6
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
7
Machine learning algorithms in context of intrusion detection
Published 2016“…The algorithms have been applied on the KDD99 dataset, which is the benchmark dataset used for anomaly-based detection technique. …”
Get full text
Get full text
Conference or Workshop Item -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
A new approach to highway lane detection by using hough transform technique
Published 2017“…Thus, this algorithm aims to detect the road lanes for three significant parameter operations; vanishing point detection, road width measurements, and Region of Interest (ROI) of the road area, for detection purposes.The techniques used in the algorithm are image enhancement and edges extraction by Sobel filter, and the main technique for lane detection is a Hough Transform. …”
Get full text
Get full text
Get full text
Article -
10
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Most computer games and simulation maintain speed as the main important elements while others such as medical and mechanical simulation needs to have a very high precision collision detection technique. Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
11
Intruder detection using histogram and edge detection algorithms
Published 2016Get full text
Get full text
Undergraduates Project Papers -
12
Eye closure and open detection using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected components utilisation
Published 2014“…This paper introduces a method to detect eye closure using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected component utilisation. …”
Get full text
Get full text
Conference or Workshop Item -
13
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…A new zero crossing technique has been developed as a new frequency feature called the Adaptive Zero Crossing (AZC) which is used to minimize false alarms and enhances the detection process. …”
Get full text
Get full text
Conference or Workshop Item -
14
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
Get full text
Get full text
Get full text
Article -
16
Continuous collision detection for virtual environments: A walkthrough of techniques
Published 2011“…Performing a computationally intensive technique for detecting between two configurations that focuses on accuracy always slows detection as compared to discrete collision detection (DCD). …”
Get full text
Get full text
Get full text
Article -
17
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
18
Obfuscated Malware Detection: Impacts on Detection Methods
Published 2024“…This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. …”
Conference Paper -
19
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…This research investigates the use of a promising technique from machine learning to designing the most suitable intrusion detection for this challenging network type. …”
Get full text
Get full text
Get full text
Thesis -
20
Forgery detection in medical images using Complex Valued Neural Network (CVNN)
Published 2011“…This technique was used to embed and detect forge watermark in Fast Fourier Transform FFT domain. …”
Get full text
Get full text
Get full text
Article
