Search Results - (( data distribution bat algorithm ) OR ( parameters information matching algorithm ))
Search alternatives:
- parameters information »
- information matching »
- data distribution »
- distribution bat »
- bat algorithm »
-
1
Application of Particle Swarm Optimization in Optimizing Stereo Matching Algorithm’s Parameters for Star Fruit Inspection System
Published 2014“…This paper reports the finding of the experimentation of the Particle Swarm Optimization in optimizing the stereo matching algorithm’s parameters for the star fruit inspection system. …”
Get full text
Get full text
Conference or Workshop Item -
2
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Stereo matching algorithm for autonomous vehicle navigation using integrated matching cost and non-local aggregation
Published 2023“…The disparity map produced by the stereo matching algorithm directly impacts the quality of the 3D information provided to the navigation system. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…To improve the UHDS16 algorithm, 8 × 8 block-matching technique has been tested. …”
Get full text
Get full text
Get full text
Book Chapter -
6
-
7
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
8
-
9
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
Get full text
Get full text
Article -
10
An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity
Published 2018“…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
Get full text
Get full text
Proceeding -
11
Deep learning model for predicting and detecting overlapping symptoms of cardiovascular diseases in hospitals of UAE
Published 2012“…Hence, the best clinical applications of DL require considerate problem solving solution, selection of the most suitable DL algorithms and information, and defining balance of outcome. …”
Get full text
Get full text
Get full text
Article -
12
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009Get full text
Get full text
Get full text
Article -
13
-
14
A robust traffic quantity measurement with video surveillance
Published 2011“…The method consists of three algorithms. First, background modeling and update, second, a boosting method to enhance the foreground image and reduce the noise and at last determining best match of region of interest (ROI) to extract information to conclude if there is a vehicle in the detection zone or not. …”
Get full text
Get full text
Article -
15
An enhanced fuzzy commitment scheme in biometric template protection
Published 2023“…The security and privacy analysis shows that with the additional hash function, it is difficult for adversary to perform brute‐force attack on information stored in database. Furthermore, the proposed approach has enhanced the aspect of unlinkability and prevents cross-matching attack. …”
Get full text
Get full text
Get full text
Thesis -
16
Optimizing n-1 contingency rankings using a nature-inspired modified sine cosine algorithm
Published 2025“…Such evaluations enable power system operators to make informed and strategic decisions during real-time scenarios. …”
Get full text
Get full text
Get full text
Article -
17
Disparity map calculation through epipolar lines estimation for 3D facial reconstruction
Published 2005“…To eliminate this problem and to increase the precision we chose to start with an initial eight matched points to generate the Fundamental Matrix (FM), this is called the 8- Points Algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Passive client-centric rogue access point detection framework for WiFi hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Thesis -
19
Compressed channel estimation for massive MIMO-OFDM systems over doubly selective channels
Published 2019“…., modified CE-SBEM) can improve the resolution of the angles of departures (AoDs) information to represent the downlink with far fewer parameter dimensions, since the AoDs are much slower than path gains. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Modelling and control of direct drive robot manipulators
Published 2003“…Based on the known bounds on the system parameters, the robot dynamic is treated as an uncertain system whereby deterministic approach can be used in controlling the system. …”
Get full text
Get full text
Get full text
Thesis
