Search Results - (( Flow selection algorithm ) OR ( Flow detection algorithm ))*
Search alternatives:
- flow selection »
- flow detection »
-
1
Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment
Published 2017“…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
Get full text
Get full text
Thesis -
2
Database encryption for a Web-based Claims System
Published 2008“…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
Get full text
Thesis -
3
Video Object Avoidance Implementation on Embedded Platform
Published 2015“…In this project, there are two motion detection techniques being studied, namely optical flow and motion templates. …”
Get full text
Get full text
Final Year Project -
4
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
5
Fault section detection and location on distribution network using analytical voltage sags database
Published 2006“…By doing this all the possible sections due to the fault can be selected. Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
Get full text
Get full text
Conference or Workshop Item -
6
Imaging of solid flow in a gravity flow rig using infra-red tomography
Published 2005“…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
Get full text
Get full text
Thesis -
7
Online simulation to monitor multiphase flow using laser source as transmitter
Published 2021“…This research presents an application of optical tomography for the detection of gas bubbles flowing in a liquid medium. …”
Get full text
Get full text
Get full text
Article -
8
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
Get full text
Get full text
Get full text
Article -
9
Online Simulation To Monitor Multiphase Flow Using Laser Source As Transmitter
Published 2024journal::journal article -
10
Video surveillance: Item monitoring against theft
Published 2023“…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
12
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Fish pellet measurement system for food industry
Published 2025“…Then, the image will be processed in a trained model to detect the fish pellet. Then, an algorithm will be used to determine the fish pellet's diameter based on the result of the detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Identification of debris flow initiation zones using topographic model and airborne laser scanning data
Published 2017“…Empirical multivariate predictive models represent an important tool to estimate debris flow initiation areas. Most of the approaches used in modelling debris flows propagation and deposit phases required identifying release (starting point) area or source area. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Artificial neural network for anomalies detection in distillation column
Published 2017“…The effect of these faults on process variables i.e. changes in distillate and bottom composition, distillate and bottom temperature, bottom flow rate, and the pressure drop is observed. The network is trained using back propagation algorithm to determine root mean square error (RMSE). …”
Get full text
Get full text
Article -
17
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…Multimodal support vector machine (SVM) algorithm was the commonest form of ML method utilized. …”
Get full text
Get full text
Get full text
Article -
18
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Moreover, at present, the control plane has no built-in security mechanism that prevents malicious SDN agents from sending authorized but forged flows to corrupt the controller state or bring the entire network down, in the worst case, even if the OpenFlow is Transport Layer Security (TLS) enabled. …”
Get full text
Get full text
Thesis -
19
Detection of the river sediment deposition area at Kuala Perlis river mouth using Landsat 8 OLI within the years 2019, 2020 and 2021 / Nur Zakira Ain Zamrun
Published 2022“…Quantification of Landsat 8 OLI satellite images was applied using ENVI software on the study area for detecting sedimentation in the study area that used image data band correlation in deposited river sediment through unsupervised classifier algorithm and selection of spectral bands for MNDWI. …”
Get full text
Get full text
Thesis -
20
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Thesis
