Search Results - (( web application solar algorithm ) OR ( its detection system algorithm ))*
Search alternatives:
- application solar »
- system algorithm »
- web application »
- solar algorithm »
- its detection »
-
1
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. During simulation, the object recognition algorithm is able to detect and classify various objects into its respective classes. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
2
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
3
-
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
5
Embedded system based driver drowsiness detection system
Published 2023“…FPGA hardware is used as its processing platform along with Viola-Jones object detection algorithm. …”
Conference paper -
6
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. The result of testing the hardware system of the automatic system shows its reliability and flexibility to provide accurate movements in two degrees of freedom as well as its dependability and system protection. …”
Get full text
Get full text
Thesis -
7
A new vertical edge detection algorithm and its application
Published 2008Get full text
Get full text
Conference or Workshop Item -
8
Norms detection and assimilation in multi-agent systems: A conceptual approach
Published 2023Conference paper -
9
System setup on jetson nano for smart crowd covid monitoring system
Published 2022“…The object detection algorithm YOLO, which stands for "You Only Look Once," divides images into a grid system. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
11
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
12
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
13
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
14
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
15
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. In this paper, an improved intrusion detection algorithm for multiclass classification was presented and discussed in detail. …”
Get full text
Get full text
Get full text
Article -
16
-
17
An FPGA based embedded vision system for real-time motion detection
Published 2015“…Due to its paramount importance for background subtraction algorithms to disregard unimportant movements such as camera jitter and tree branches, a multi model sigma delta algorithm was used. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems
Published 2023“…Currently, research in normative multi-agent systems focus on how a visitor or new agent detects and updates its host norms autonomously without being explicitly given by the host system. …”
Conference paper -
19
Norms detection and assimilation in multi-agent systems: a conceptual approach
Published 2012Get full text
Book Section -
20
A new algorithm for human face detection using skin color tone
Published 2013“…This paper introduces a new approach to face detection systems using the skin color of a subject. …”
Get full text
Get full text
Get full text
Article
