Search Results - (( its application _ algorithm ) OR ( its detection based algorithm ))
Search alternatives:
- its application »
- detection based »
- its detection »
-
1
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
2
A review of YOLO algorithm and its applications in autonomous driving object detection
Published 2025“…This paper reviews the YOLO algorithm and its application in object detection in autonomous driving scenarios. …”
Get full text
Get full text
Get full text
Article -
3
A new vertical edge detection algorithm and its application
Published 2008Get full text
Get full text
Conference or Workshop Item -
4
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…A blind signal detector, which is known as eigenvalue based detection, was found to be the most desired detector for its detection capabilities, time of execution, and zero a-priori knowledge. …”
Get full text
Get full text
Get full text
Thesis -
5
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
6
-
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
9
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
10
-
11
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…The fault syndrome based on read operations of the proposed algorithm is generated to determine its diagnostic capability. …”
Get full text
Get full text
Thesis -
12
An FPGA based embedded vision system for real-time motion detection
Published 2015“…Due to its paramount importance for background subtraction algorithms to disregard unimportant movements such as camera jitter and tree branches, a multi model sigma delta algorithm was used. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Evaluation of feature selection algorithm for android malware detection
Published 2018“…Proposed algorithm applied considers the feature based on its level of importance. …”
Get full text
Article -
14
A review of object detection in traffic scenes based on deep learning
Published 2024“…This survey is based on the theory of deep learning. It systematically summarizes the Development and current research status of object detection algorithms, and compare the characteristics, advantages and disadvantages of the two types of algorithms. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
17
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The said algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the telecommunication company. …”
Get full text
Get full text
Get full text
Thesis -
19
Shot boundary detection based on orthogonal polynomial
Published 2019“…SBD is the process of automatically partitioning video into its basic units, known as shots, through detecting transitions between shots. …”
Get full text
Get full text
Get full text
Article -
20
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis
