Search Results - (( based constructive method algorithm ) OR ( rate detection method algorithm ))
Search alternatives:
- based constructive »
- method algorithm »
- rate detection »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Conventional methods of inspection of constructions are time-consuming, require much labor, and make people stand in hazardous conditions. …”
Get full text
Get full text
Student Project -
3
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
4
Object Localization In 3D Point Cloud
Published 2020“…In the descriptor construction step particularly, two methods, Point Feature Histogram (PFH) and Signature of Histograms of OrienTations (SHOT) were compared. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
New CFAR algorithm and circuit development for radar receiver
Published 2020“…The last MATLAB test for MSS-CA- vi CFAR with a spiky exponential model shown in Table 4.3 in chapter four shows clearly that MSS-CA-CFAR detects nine targets from ten that means the efficiency of detection of the proposed method is 90%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
7
Obstacle detection for Unmanned Aerial Vehicle (UAV)
Published 2022“…In real-time experiment, the success rate for good texture (40%), poor texture (55%) and texture-less (45%) The findings indicate that the recommended method works well for detecting textures-less obstacle even though the success rate is only 40% because out of 10 test only one test is fail on detecting free region. …”
Get full text
Get full text
Get full text
Article -
8
Development of new code for optical code division multiple access systems
Published 2011“…Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
Get full text
Thesis -
9
Analysis of dysgraphic children based on letter position / Zarith Marissa Mustafa
Published 2015“…Another objective is to construct a prototype based on Kohonen (SOM) method to classify children with potential dysgraphia symptom whether it is high, medium or low potential. …”
Get full text
Get full text
Thesis -
10
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Most existing methods deal with the detection of an action after its completion. …”
Get full text
Get full text
Thesis -
11
Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle
Published 2018“…The textured situation gives a high success rate while textureless situation produces acceptable success rate until 60cm distance.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
An adaptive face recognition under constrained environment for smartphone database
Published 2018“…Finally, this study aims to obtain high-accuracy face recognition performance under the uncontrolled environment of a smartphone database based on the proposed adaptive face recognition method that combines two new face recognition algorithms. …”
Get full text
Get full text
Thesis -
13
-
14
Performance evaluation on quantized weight for convolutional neural network based object detection
Published 2021“…In this research, a real-time CNN based object detection system is presented. The system is designed based on the modified You Only Look Once (modified-YOLO) architecture which is constructed with only 7 CNN layers. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on Singular Value Decomposition (SVD). The proposed method has declared the superiority over the conventional methods that are being used in the current applications of TD-SCDMA systems. …”
Get full text
Get full text
Thesis -
16
Delamination in fiberglass pre-impregnated laminated composites from ultrasonic a-scan signal using artificial intelligence
Published 2018“…Besides affected the material strength and structural reliability, this failure mode normally present minor damage on the surface but the internal damage may extensive. Existing detection method using static and dynamic load response have limitations that are considered static based monitoring and require the sensor to be attached to the test specimen surface. …”
Get full text
Get full text
Thesis -
17
-
18
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
19
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
20
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis
