Search Results - (( simulation optimization method algorithm ) OR ( frames detection sensor algorithm ))
Search alternatives:
- method algorithm »
- frames detection »
- detection sensor »
- sensor algorithm »
-
1
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
Get full text
Get full text
Final Year Project -
2
A monocular view-invariant fall detection system for the elderly in assisted home environments
Published 2011“…An ensemble of pose models performs inference on each video frame. Each pose model employs an expectation-maximization algorithm to estimate the probability that the given frame contains the corresponding pose. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Web Camera Application For Motion Detection
Published 2003“…There are many different ways to detect motion. The conventional way is by using either active sensor or passive sensor. …”
Get full text
Get full text
Thesis -
4
Vision-Based Autonomous Vehicle Driving Control System
Published 2005“…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
Get full text
Get full text
Thesis -
5
Vision-based autonomous vehicle driving control system
Published 2005“…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
Get full text
Get full text
Thesis -
6
Zero acceleration algorithm with state of motion identifier for position estimation of wheeled robot
Published 2019“…The proposed framework consists of zero acceleration algorithm which responsible to detect the time and duration of a wheeled robot when it is travelling at constant speed (zero acceleration), zero velocity update to detect the still phase of the wheeled robot and improved drift correction. …”
Get full text
Thesis -
7
Development of obstable avoidance system for 3D robot navigation
Published 2024“…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle
Published 2017“…In this paper, combination of both sensors based is proposed for a small UAV obstacle detection system. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Region Detection Technique Using Image Subtraction and Pixel Expansion Cue for Obstacle Detection System on Small – Sized UAV
Published 2024“…: This research paper is about method of detection of free region and obstacle region by combining image segmentation and frame subtraction method. …”
Get full text
Get full text
Get full text
Article -
10
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…The algorithm used for feature detection and description is Oriented-FAST Rotated-BRIEF (ORB), whereas to evaluate the homography for pose estimation, Random Sample Consensus (RANSAC) is used. …”
Get full text
Get full text
Get full text
Article -
11
Optimization of turning parameters using genetic algorithm method
Published 2008“…The simulation based on Genetic Algorithm are successful develop and the optimum parameters values are obtained from the simulation.…”
Get full text
Get full text
Undergraduates Project Papers -
12
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…This thesis proposes and simulates the three novel optimization algorithms to handle DG allocation, different single-objective, and multi-objective OPF problems. …”
Get full text
Get full text
Thesis -
13
A discrete simulated kalman filter optimizer for combinatorial optimization problems
Published 2022“…An example of a numerical algorithm is the simulated Kalman filter (SKF). Various method has been introduced as an extension of a numerical algorithm to adapt it to a discrete search space. …”
Get full text
Get full text
Thesis -
14
Route optimization using shortest path method / Muhamad Faisal Amin Shakri
Published 2025“…Therefore, the effectiveness of route planning is very essential. The method to study route optimization is called shortest path method. …”
Get full text
Get full text
Thesis -
15
Improved particle swarm optimization by fast annealing algorithm
Published 2019“…We also apply the algorithm in clustering problem, and the results shows that the proposed method has better accuracy than the optimization methods.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Asynchronous simulated kalman filter optimization algorithm
Published 2018“…Simulated Kalman filter (SKF) is an optimization algorithm which is inspired by Kalman filtering method. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Around view monitoring system with motion estimation in ADAS application
Published 2019“…The algorithm to be tested is Gunnar Farneback. Movement in sequential frames is detected and converted to the real-world position change. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In this research, two novel estimation-based metaheuristic optimization algorithms, named as Simulated Kalman Filter (SKF), and single-solution Simulated Kalman Filter (ssSKF) algorithms are introduced for global optimization problems. …”
Get full text
Get full text
Thesis -
19
Passive client-centric rogue access point detection framework for WiFi hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Thesis -
20
Optimization of milling parameters using ant colony optimization
Published 2008“…The simulation based on ACO algorithm are successful develop and the optimization of parameters values is to maximize the production rate is obtain from the simulation.…”
Get full text
Get full text
Undergraduates Project Papers
