Search Results - (( frames detection sensor algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- parameter detection »
- frames detection »
- sensor algorithm »
- method algorithm »
-
1
Vision-Based Autonomous Vehicle Driving Control System
Published 2005“…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
Get full text
Get full text
Thesis -
2
Vision-based autonomous vehicle driving control system
Published 2005“…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
Get full text
Get full text
Thesis -
3
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
Get full text
Get full text
Final Year Project -
4
A monocular view-invariant fall detection system for the elderly in assisted home environments
Published 2011“…An ensemble of pose models performs inference on each video frame. Each pose model employs an expectation-maximization algorithm to estimate the probability that the given frame contains the corresponding pose. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Web Camera Application For Motion Detection
Published 2003“…There are many different ways to detect motion. The conventional way is by using either active sensor or passive sensor. …”
Get full text
Get full text
Thesis -
6
Zero acceleration algorithm with state of motion identifier for position estimation of wheeled robot
Published 2019“…The proposed framework consists of zero acceleration algorithm which responsible to detect the time and duration of a wheeled robot when it is travelling at constant speed (zero acceleration), zero velocity update to detect the still phase of the wheeled robot and improved drift correction. …”
Get full text
Thesis -
7
Development of obstable avoidance system for 3D robot navigation
Published 2024“…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle
Published 2017“…In this paper, combination of both sensors based is proposed for a small UAV obstacle detection system. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Region Detection Technique Using Image Subtraction and Pixel Expansion Cue for Obstacle Detection System on Small – Sized UAV
Published 2024“…: This research paper is about method of detection of free region and obstacle region by combining image segmentation and frame subtraction method. …”
Get full text
Get full text
Get full text
Article -
10
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…The algorithm used for feature detection and description is Oriented-FAST Rotated-BRIEF (ORB), whereas to evaluate the homography for pose estimation, Random Sample Consensus (RANSAC) is used. …”
Get full text
Get full text
Get full text
Article -
11
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
12
Around view monitoring system with motion estimation in ADAS application
Published 2019“…The algorithm to be tested is Gunnar Farneback. Movement in sequential frames is detected and converted to the real-world position change. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Passive client-centric rogue access point detection framework for WiFi hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Thesis -
14
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
15
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
16
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
18
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process
Published 2017“…It was programmed to detect sunlight via the LDRs before actuating the motor to position the parabolic frame. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis
