Search Results - (( location detection path algorithm ) OR ( early identification using algorithm ))
Search alternatives:
- early identification »
- identification using »
- location detection »
- using algorithm »
- detection path »
- path algorithm »
-
1
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
Get full text
Get full text
Get full text
Thesis -
2
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
3
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
5
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
6
Design of intelligent Qira’at identification algorithm
Published 2017“…To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
Get full text
Get full text
Thesis -
7
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
Published 2021“…The system provide an accuracy around 80% confidence when detecting a vehicle plate number and successfully display the path of the vehicle based on the time and location of the vehicle detected.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
9
Early Detection Of ADHD Among Children Using Machine Learning
Published 2023“…Early identification using fMRI and machine learning holds great potential for improving the lives of children with ADHD through timely interventions and targeted support.…”
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
-
12
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…However traveling in such region to the target location, there exist some unknown obstacles for the mobile robot especially in real-world environment with unknown map and unpredictable obstacle location, thus the control algorithms must be able to promptly react upon the unpredictable. …”
Get full text
Get full text
Thesis -
13
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
14
ROBOT NAVIGATION USING CAMERA BY IDENTIFYING SIGNAGES
Published 2017“…Unique images of signage placed at strategic location to give information for the directions pertaining to a desired path plan. …”
Get full text
Get full text
Final Year Project -
15
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…More useful information about the attack flow provided by the routers along the attack path to the IDS, can provide higher accuracy to locate the attacker. …”
Get full text
Get full text
Thesis -
16
Mobile Robot with Navigation Control and Communication
Published 2016“…The robot is designed to implement the project in the study of autonomous navigation and path planning. Other than that, various algorithm can be applied to it with the need to physically access on-board microcontroller for programming. …”
Get full text
Get full text
Final Year Project -
17
An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm
Published 2023“…In this paper, we calculate the shortest path between the nodes or substations by using Dijkstra’s algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues
Published 2024“…•Detailed method to identify the gut mycobiome in colorectal cancer patients using ITS-specific amplicon sequencing. •Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
Get full text
Get full text
Get full text
Article -
19
Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi
Published 2024“…The vehicle uses ultrasonic sensors and a USB webcam to detect and avoid obstacles on its path with the aid of a Raspberry Pie program that effectively executes decision-making changes to manoeuvre the vehicle away from objects on a free path. …”
Get full text
Get full text
Get full text
Article -
20
Development of a State-Space Observer for Active Noise Control Systems
Published 2009“…The secondary path of the ANC system is modeled by using the LMS algorithm to complete the design of the Filtered-X Least Mean Square (FXLMS) controller. …”
Get full text
Get full text
Thesis
