Search Results - (( web application solar algorithm ) OR ( its detection system algorithm ))*

Refine Results
  1. 1

    Mobile machine vision for railway surveillance system using deep learning algorithm by Kit, Guan Lim, Daniel Siruno, Min, Keng Tan, Chung, Fan Liau, Sha, Huang, Tze, Kenneth Kin Teo

    Published 2021
    “…This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. During simulation, the object recognition algorithm is able to detect and classify various objects into its respective classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  2. 2

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Embedded system based driver drowsiness detection system by Islam S.Z., Mohd Ali M.A., Bin Jidin R., Islam S.Z.

    Published 2023
    “…FPGA hardware is used as its processing platform along with Viola-Jones object detection algorithm. …”
    Conference paper
  6. 6

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. The result of testing the hardware system of the automatic system shows its reliability and flexibility to provide accurate movements in two degrees of freedom as well as its dependability and system protection. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    System setup on jetson nano for smart crowd covid monitoring system by Muhammad Othman, Maliki

    Published 2022
    “…The object detection algorithm YOLO, which stands for "You Only Look Once," divides images into a grid system. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  14. 14

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. In this paper, an improved intrusion detection algorithm for multiclass classification was presented and discussed in detail. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    An FPGA based embedded vision system for real-time motion detection by AlDahoul, Nouar, Htike@Muhammad Yusof, Zaw Zaw

    Published 2015
    “…Due to its paramount importance for background subtraction algorithms to disregard unimportant movements such as camera jitter and tree branches, a multi model sigma delta algorithm was used. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems by Mahmoud M.A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Mustapha A., Hamid N.H.A.

    Published 2023
    “…Currently, research in normative multi-agent systems focus on how a visitor or new agent detects and updates its host norms autonomously without being explicitly given by the host system. …”
    Conference paper
  19. 19
  20. 20

    A new algorithm for human face detection using skin color tone by Zangana, Hewa Majeed, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…This paper introduces a new approach to face detection systems using the skin color of a subject. …”
    Get full text
    Get full text
    Get full text
    Article