Search Results - (( data detection method algorithm ) OR ( data virtualization based algorithm ))
Search alternatives:
- virtualization based »
- data virtualization »
- method algorithm »
- data detection »
-
1
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…As for this study, virtual area based is been used which applied to bathymetry data set that has been collected by using R2 Sonic 2020. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…All the algorithms were pretrained from ImageNet data-base before training with the wafer defect images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO
Published 2010“…Lastly, in the final stage it elaborates different methods of displaying reconstructed result. Different sets of data are processed based on the steps involved in correspondence and the results are discussed and compared in detail. …”
Get full text
Get full text
Thesis -
7
A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system
Published 2020“…The proposed method of classifier is developed using virtual instrumentation LabVIEW facility, for detection of various faults such as symmetrical, unsymmetrical, and HIF in the system. …”
Get full text
Get full text
Get full text
Article -
8
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
Get full text
Get full text
Thesis -
9
3D hand posture recognition using multicam
Published 2011“…The hand posture recognition will employ a simple but robust algorithm by checking the number of fingers detected around virtually created circle centered at the Center of Mass (CoM) of the hand and therefore classifies the class associated with a particular hand posture. …”
Get full text
Get full text
Conference or Workshop Item -
10
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
Published 2020“…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
Get full text
Get full text
Thesis -
11
Modeling of cupping suction system based on system identification method
Published 2022“…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
Get full text
Get full text
Undergraduates Project Papers -
12
-
13
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…Attempts have been made to resolve all of these issues by using several methods such as: full text searching, text indexing, a database schema management, database data model, and query-based techniques. …”
Get full text
Get full text
Thesis -
14
Emulation of the Space Robotics System on Earth
Published 2001“…Moreover this instrumental setup for emulation of space robot system can be used for various algorithms study based on robotics, control and other areas.…”
Get full text
Get full text
Thesis -
15
Intruder localization wireless sensor network radar design with virtual reference tags
Published 2014“…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
18
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Based on the proposed algorithms, energy consumption can be reduced…”
Get full text
Get full text
Get full text
Article -
19
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
