Search Results - (( oil extraction method algorithm ) OR ( based detection system algorithm ))
Search alternatives:
- extraction method »
- method algorithm »
- system algorithm »
- based detection »
- oil extraction »
-
1
Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid
Published 2020“…Therefore, the final output of tree crown shows the watershed transformation algorithm is the best method for use represented oil palm tree counting in the map which is the accuracy assessment is 38.9%.…”
Get full text
Get full text
Thesis -
2
Development of sorting system for oil palm in vitro shoots using machine vision approach
Published 2014“…By using k-means algorithm the extracted features have been evaluated. …”
Get full text
Get full text
Thesis -
3
Terahertz sensing analysis for early detection of ganoderma boninense disease using near infrared (NIR) spectrometer
Published 2023“…A portable smart G. boninense detection system prototype is developed by implementing the Internet of Things (IoT) into the system which enables the integration of sensors and server to perform prediction of healthy or infected oil palm seedlings. …”
Get full text
Get full text
Thesis -
4
Near-infrared technique for oil palm fruit grading system
Published 2013“…The grading systems in general utilized improved engineering designs with image processing techniques to ensure the quality of the product.In this research, a hyperspectral oil palm grading system was built and an image processing techniques algorithm was developed based on the spectral reflectance of the external features of oil palm fresh fruit bunches (FFB). …”
Get full text
Get full text
Thesis -
5
Development of an automated detector and counter for bagworm census
Published 2020“…There are several recommendations from this study that have been suggested including the use of hyperspectral imaging to detect bagworms, application of radio frequency to detect live bagworms, open system detection of the bagworms, application of pseudo colour concept and method to detect early stage of bagworm attack.…”
Get full text
Get full text
Thesis -
6
Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm
Published 2018“…In conclusion, for early detection of Ganoderma, better accuracies were derived from the spectroradiometer which is a destructive and ground based method and still requires individual leaf sampling. …”
Get full text
Get full text
Get full text
Thesis -
7
Feature extraction from oil palm in vitro shoot images
Published 2010“…The algorithms and methods developed are robust and advanced enough to be used in combination with a machine vision algorithm and automation system. …”
Get full text
Get full text
Article -
8
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
9
Machine learning algorithms in context of intrusion detection
Published 2016“…Design of efficient, accurate, and low complexity intrusion detection system is a challenging task. Intrusion detection method is a core of intrusion detection system and it can be either signature based or anomaly based. …”
Get full text
Get full text
Conference or Workshop Item -
10
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
12
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
13
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
14
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
16
Embedded system based driver drowsiness detection system
Published 2023“…This paper presents a System-on-Chip (SoC) visual-based driver drowsiness detection system. …”
Conference paper -
17
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
18
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
19
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
