Search Results - (( using function _ algorithm ) OR ( basic detection system algorithm ))
Search alternatives:
- system algorithm »
- basic detection »
- using function »
-
1
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
Web Camera Application For Motion Detection
Published 2003“…This self-created motion detection software is then installed and run on the PC to function as a complete intelligent motion detection system.…”
Get full text
Get full text
Thesis -
3
Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.]
Published 2019“…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…The system design part will explains the flow and functionality of the system structure. …”
Get full text
Get full text
Thesis -
5
Power System State Estimation In Large-Scale Networks
Published 2010“…Power system state estimation constitutes one of the critical functions that are executed at the control centers. …”
Get full text
Get full text
Thesis -
6
Boosted HOG features and its application on object movement detection
Published 2018“…On that basis, we create a new feature with boosting algorithm to obtain more accurate result. In detecting vehicles part, we use the shadow underneath vehicle as the feature, so we can utilize it to detect vehicles in daytime. …”
Get full text
Get full text
Article -
7
Boosted HOG features and its application on object movement detection
Published 2018“…On that basis, we create a new feature with boosting algorithm to obtain more accurate result. In detecting vehicles part, we use the shadow underneath vehicle as the feature, so we can utilize it to detect vehicles in daytime. …”
Get full text
Get full text
Article -
8
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
Get full text
Get full text
Get full text
Article -
9
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
10
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The algorithm enhances the recognition ability of the system compared to manual extraction and labeling of pattern classes. …”
Get full text
Get full text
Thesis -
11
Speech emotion verification system (SEVS) based on MFCC for real time applications
Published 2008“…Since features extracted using the MFCC simulates the function of the human cochlea, neural network (NN) and fuzzy neural network algorithm namely; Multi Layer Perceptron (MLP), Adaptive Network-based Fuzzy Inference System (ANFIS) and Generic Selforganizing Fuzzy Neural Network (GenSoFNN) were used to verify the different emotions. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Google the earth: what's next?
Published 2010“…Through remote sensing, our basic scientific knowledge of the Earth and how it functions has expanded rapidly in the last few decades. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
13
Fault Detection Relevant Modeling of an Industrial Gas Turbine based on Neuro-Fuzzy Approach
Published 2010“…Analytical redundancy based fault detection and diagnosis system for an industrial gas turbine requires accurate model of the unit. …”
Get full text
Conference or Workshop Item -
14
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…Palmprint recognition system in unrestricted environment requires a robust algorithm capable of adapting to complex environment. …”
Get full text
Get full text
Get full text
Monograph -
15
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005Get full text
Get full text
Final Year Project -
16
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…I use the Basic Stamp2 as our controller. For this operation, if sensor detect obstacle, robot will move direction no restriction to reach to last post.…”
Get full text
Learning Object -
17
Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process
Published 2017“…The tracking algorithm determines the angles which are used to determine the position of solar tracker. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
Get full text
Get full text
Conference or Workshop Item -
19
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
20
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article
