Search Results - (( based detection system algorithm ) OR ( some application using algorithmic ))*
Search alternatives:
- system algorithm »
- some application »
- algorithmic »
-
1
Malaysian license plate number detection based on sobel vertical edge algorithm / Siti Nor Azimah Ibrahim
Published 2007“…Sobel Vertical Edge Algorithm approach will be used in order to detect the license plate number fi-om digital image as well as some experimental result to filter the detected edge of license plate successfully.…”
Get full text
Get full text
Thesis -
2
Evaluation of feature selection algorithm for android malware detection
Published 2018“…The Android features were filtered before detection process using TF-IDF algorithm. However, IDF is unaware to the training class labels and give incorrect weight value to some features. …”
Get full text
Article -
3
Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application
Published 2016“…The main objective for this research is to calculate the position of the object based on the distance using Wi-Fi Triangulation Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
5
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…Human skin detection is an important preprocessing step in many applications involving images such as face detection, gesture tracking, and nudity detection. …”
Get full text
Get full text
Thesis -
6
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
Published 2012“…Firstly, we divide the malicious peers into six categories; secondly, we bring forward PeerMate, a malicious peers detection algorithm based on Multiscale Principal Component Analysis (MSPCA) and Quality of Reconstruction (QR), to detect malicious peers in reputation based P2P systems; finally, we show through simulations that PeerMate can detect malicious peers efficiently and accurately.…”
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…For constructing map robot can use on built range finder sensor or using vision based systems. Also the algorithm using segmentation strategy is using frontier base algorithm for exploring divided area. …”
Get full text
Get full text
Get full text
Article -
9
Intruder detection in camera networks using the one-class neighbor machine
Published 2011“…We propose a new algorithm based on machine learning techniques for automatic intruder detection in surveillance networks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
Get full text
Get full text
Thesis -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Some of the previous researchers used a feature set selection which is introduced for IDS but there still shortage in their detection rate and selected amounts of features. …”
Get full text
Get full text
Thesis -
12
PMDA: A malicious peer detection algorithm for P2P systems
Published 2011“…We first divide malicious peers into several categories, and then introduce Principal direction divisive partitioning based Malicious peer Detection Algorithm (PMDA) to identify them. …”
Get full text
Get full text
Get full text
Article -
13
AUTOMATED VEHICLE COUNTING AND CLASSIFICATION SYSTEM FOR TRAFFIC CENSUS
Published 2012“…The chosen algorithm for vehicle detection is called approximate median as it is more accurate compared to background subtraction method. …”
Get full text
Get full text
Final Year Project -
14
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
15
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
17
Embedded Fuzzy Classifier for Detection and Classification of Preseizure state using Real EEG data
Published 2014“…This has been achieved in this work through the use of Fuzzy Classifiers based on the lookup table to empower system simplicity. …”
Get full text
Get full text
Book Section -
18
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
19
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Moreover, the study also pointed out the limitations of the manual and automatic crack detection system and underlined the fact that flight planning is one of the most critical parameters in the context of UAV-based inspections. …”
Get full text
Get full text
Student Project -
20
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009“…The algorithm is based on erosion followed by dilation segmentation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
