Search Results - (( data validation using algorithm ) OR ( frames detection path algorithm ))
Search alternatives:
- validation using »
- frames detection »
- data validation »
- using algorithm »
- detection path »
- path algorithm »
-
1
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis -
2
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
3
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Intelligent auto tracking in 3D space by image processing
Published 2009“…Hence, the spherical coordinates of the target are defined and updated with every TV frame. The time development of the centroid in successive TV frames represents the real time trajectory of the target path. …”
Get full text
Get full text
Proceeding Paper -
5
Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle
Published 2017“…In the experiment conducted, we successfully detect and determine a safe avoidance path for the UAV on 6 different sizes and textures of the obstacles including textureless obstacles…”
Get full text
Get full text
Get full text
Get full text
Article -
6
Safe avoidance region detection for unmanned aerial vehicle using cues from expansion of feature points
Published 2024“…A robust system should be able to not only detect obstacles but the free region for the avoidance path as well. …”
Get full text
Get full text
Conference or Workshop Item -
7
Real time tracking in 3D space by robotic vision
Published 2007“…The tracking is based on passive detection using live TV imaging. The target coordinates are determined by an image processing technique and non-linear prediction algorithm. …”
Get full text
Get full text
Proceeding Paper -
8
-
9
Object tracing from synthetic fluid spray through instance segmentation
Published 2024“…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
Get full text
Get full text
Thesis -
10
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness. …”
Get full text
Get full text
Thesis -
11
Design and implementation of an object-following system by using DJI Tello drone
Published 2025“…The DJI Tello is a lightweight quadcopter equipped with a 5-megapixel camera capable of capturing 720p video at 30 frames per second. The system employs computer vision techniques, particularly Convolutional Neural Networks (CNNs), to detect and track moving objects in real time, while dynamically adjusting the drone’s flight path to maintain continuous visual contact. …”
Get full text
Get full text
Get full text
Article -
12
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
Get full text
Get full text
Final Year Project -
13
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz
Published 2010“…This problem can be solved by cluster validity index. Cluster validity index is needed to find the suitable number of cluster, c in any fuzzy clustering algorithm. …”
Get full text
Get full text
Thesis -
15
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness [1]. …”
Get full text
Get full text
Get full text
Article -
16
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
17
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
Get full text
Get full text
Thesis -
18
Design And Implementation of an Object-Following System by Using DJI Tello Drone
Published 2026journal::journal article -
19
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
Get full text
Get full text
Get full text
Article -
20
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis
