Search Results - (( work detection queue algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- java application »
- queue algorithm »
- work detection »
-
1
-
2
Passenger Counting With Face Detection
Published 2020“…MobileNet-single shot detector (SSD) is chosen as the object detector model since it belongs to a class of efficient models that can execute on mobile and embedded systems. While running detections across every video frames, centroid tracking algorithm tracks every unique person in video streams, where Kalman filter is further applied to reduce the noise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle
Published 2017“…Due to size and weight constraints, very limited detection sensors can be equipped in the system. Prior works focused on a single sensing device which is either camera or range sensors based. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
A hybrid rate control mechanism for forwarding and congestion control in named data network
Published 2020“…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle
Published 2018“…Due to size and weight constraints, very limited detection sensors can be equipped in the system. Prior works focused on a single sensing device which is either camera or range sensors based. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
