Search Results - parallel detection ((((learning algorithm) OR (sensor algorithm))) OR (path algorithm))
Search alternatives:
- parallel detection »
- learning algorithm »
- sensor algorithm »
- path algorithm »
-
1
Development of an automatics parallel parking system for nonholonomic mobile robot
Published 2011“…The path planning algorithm is developed based on the data acquired from the sensor. …”
Get full text
Get full text
Conference or Workshop Item -
2
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
Get full text
Get full text
Thesis -
3
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
Article -
4
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
5
Distributed parallel deep learning with a hybrid backpropagation-particle swarm optimization for community detection in large complex networks
Published 2022“…In this paper, a parallel deep learning-based community detection method in large complex networks (CNs) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A parallel ensemble learning model for fault detection and diagnosis of industrial machinery
Published 2023“…Accordingly, this paper proposes a new parallel ensemble model comprising hybrid machine and deep learning for undertaking FDD tasks. …”
Get full text
Get full text
Get full text
Article -
7
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
9
Online simulation to monitor multiphase flow using laser source as transmitter
Published 2021“…Linear Back-projection (LBP) is the algorithm that is used to reconstruct the image in real-time. …”
Get full text
Get full text
Get full text
Article -
10
Real-time Rotation Invariant Hand Tracking Using 3D Data
Published 2014“…The propose hand tracking algorithm is rotation invariant, since it can detects and tracks various rotations of hand and it is also can remove unwanted object (noise) that also moving parallel with hand's position.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
12
A test case generation framework based on UML statechart diagram
Published 2018“…Current studies also hardly address loops and parallel paths issues, and achieved low coverage criteria. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
Get full text
Get full text
Thesis -
14
Square patch feature based face detection architecture for high resolution smart camera
Published 2010“…The face detection algorithm is based on a new weak classifier type that we called square patch feature. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Online Simulation To Monitor Multiphase Flow Using Laser Source As Transmitter
Published 2024journal::journal article -
16
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
17
A hybrid rate control mechanism for forwarding and congestion control in named data network
Published 2020“…Named Data Networking (NDN) is an emerging Internet architecture that employs a pull-based, in-path caching, hop-by-hop, and multi-path transport architecture. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Robust tweets classification using arithmetic optimization with deep learning for sustainable urban living
Published 2024“…In this view, this research develops an arithmetic optimization algorithm with deep learning based tweets classification (AOADL-TC) approach for sustainable living. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction
Published 2013“…The novelty control design is an artificial neural network (ANN) adopting a modified mathematical algorithm (a modified delta rule weight-updating W-H) and a suitable alpha value (learning rate value) which determines the filters optimal operation. …”
Get full text
Get full text
Conference or Workshop Item -
20
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
Get full text
Get full text
Get full text
Article
