Search Results - (( location detection path algorithm ) OR ( panel optimization svm algorithm ))*
Search alternatives:
- location detection »
- panel optimization »
- optimization svm »
- detection path »
- path algorithm »
- svm algorithm »
-
1
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
Get full text
Get full text
Get full text
Thesis -
2
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
3
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
5
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis -
6
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
Published 2021“…The system provide an accuracy around 80% confidence when detecting a vehicle plate number and successfully display the path of the vehicle based on the time and location of the vehicle detected.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…However traveling in such region to the target location, there exist some unknown obstacles for the mobile robot especially in real-world environment with unknown map and unpredictable obstacle location, thus the control algorithms must be able to promptly react upon the unpredictable. …”
Get full text
Get full text
Thesis -
9
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
10
ROBOT NAVIGATION USING CAMERA BY IDENTIFYING SIGNAGES
Published 2017“…Unique images of signage placed at strategic location to give information for the directions pertaining to a desired path plan. …”
Get full text
Get full text
Final Year Project -
11
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…More useful information about the attack flow provided by the routers along the attack path to the IDS, can provide higher accuracy to locate the attacker. …”
Get full text
Get full text
Thesis -
12
Mobile Robot with Navigation Control and Communication
Published 2016“…The robot is designed to implement the project in the study of autonomous navigation and path planning. Other than that, various algorithm can be applied to it with the need to physically access on-board microcontroller for programming. …”
Get full text
Get full text
Final Year Project -
13
An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm
Published 2023“…In this paper, we calculate the shortest path between the nodes or substations by using Dijkstra’s algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi
Published 2024“…The vehicle uses ultrasonic sensors and a USB webcam to detect and avoid obstacles on its path with the aid of a Raspberry Pie program that effectively executes decision-making changes to manoeuvre the vehicle away from objects on a free path. …”
Get full text
Get full text
Get full text
Article -
15
Development of a State-Space Observer for Active Noise Control Systems
Published 2009“…The secondary path of the ANC system is modeled by using the LMS algorithm to complete the design of the Filtered-X Least Mean Square (FXLMS) controller. …”
Get full text
Get full text
Thesis -
16
An Efficient Route Selection Based on AODV Algorithm for VANET
Published 2016“…The employment of (VANET) assists to increase the data delivery by providing a second path to send an emergency message to the rescue services center (RSC) whenever an accident located at out of coverage area for GSM network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An Efficient Route Selection based on AODV Algorithm for VANET
Published 2016“…The employment of (VANET) assists to increase the data delivery by providing a second path to send an emergency message to The Rescue Services Center (RSC) whenever an accident located at out of coverage area of GSM network. …”
Get full text
Get full text
Get full text
Article -
18
Smart resource tracking and tracing system (SRTTS)
Published 2017“…Method used by the system is providing an algorithm on showing the shortest path which will act as a recommender system. …”
Get full text
Get full text
Book Section -
19
Real time tracking in 3D space by robotic vision
Published 2007“…The tracking is based on passive detection using live TV imaging. The target coordinates are determined by an image processing technique and non-linear prediction algorithm. …”
Get full text
Get full text
Proceeding Paper -
20
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article
