Search Results - solution ((((calibration techniques) OR (detection technique))) OR (computing techniques))
Search alternatives:
- calibration techniques »
- computing techniques »
-
1
Experimental analysis of camera calibration techniques used for eye tracking
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Implementation of A.I. vehicle detection for traffic analysis using in-situ surveillance infrastructure
Published 2023“…The technique used eliminates the video calibration, including distance and angle, required for detecting accurate speeds. …”
Get full text
Get full text
Get full text
Article -
3
Sedentary sitting posture recognition with YOLOv3 algorithm / Muhammad Amin Mohamad Razali
Published 2023“…Existing solutions to sedentary sitting behaviour problems by utilizing pressure and depth sensors requires suffers from lack of calibration and are often expensive. …”
Get full text
Get full text
Thesis -
4
Palm fruit ripeness detection and classification using various YOLOv8 models
Published 2023“…However, many methods require complex operations, controlled settings, or manual calibrations. Although innovative, microwave sensors and inductive techniques have drawbacks like sample preparation and equipment dependence. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
Published 2019“…The proposed technique aims to detect Botnet zero-day attack in real time. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
The use of solid phase microextraction technique for the extraction of trihalomethanes in drinking water
Published 1999“…This technique involves exposing a fused silica fibre that has been coated with a stationary phase to an aqueous solution containing organic contaminants. …”
Get full text
Get full text
Article -
7
Determination of alcohol content in sushi and sushi dipping sauces using headspace GCMS with full evaporation technique approach / Dzulkifly Mat Hashim, Prof. Madya Dr. Faridah Aba...
Published 2012“…No matrix effects were detected on ethanol as well as internal standard in starch solution up to 15% and salt content up to 5%. …”
Get full text
Get full text
Book Section -
8
Electromagnetic characteristic of open ended coaxial and optical fibre techniques for moisture content measurement in maize
Published 2012“…The calibration was performed using a full one-port calibration technique. …”
Get full text
Get full text
Thesis -
9
Stepping-stone detection technique for recognizing legitimate and attack connections
Published 2015“…However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Stereo Camera-Based Aerial Target Geolocation in a Ground-Based Platform Environment
Published 2024thesis::master thesis -
11
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
Published 2022“…The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.…”
Get full text
Get full text
Thesis -
12
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
13
An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment
Published 2024“…DDoS detection solutions based on Machine learning techniques and entropy techniques in SDN suffer from either increase the CPU usage or increase false alarms. …”
thesis::doctoral thesis -
14
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
Published 2016“…This proposed technique is a lightweight solution which consumes less controller resources in detecting and mitigating the DoS attack. …”
Get full text
Get full text
Get full text
Thesis -
15
Fighting video analysis employing computer vision technique
Published 2022“…This project is about analysing and classifying the fighting video from the UCF_Crimes dataset to explore solutions to detect fighting events employing computer vision technique. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Dopamine sensing and measurement using threshold and spectral measurements in random lasers
Published 2024Subjects:Article -
17
Malicious website detection
Published 2019“…With previous existing methods in consideration, the method to use for this project is by using heuristic-based detection with machine learning technique and the feature that will be used together with the technique is URL based feature. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…Therefore, the microwave imaging technique is proposed to detect the wood defects. In this thesis, Forward-Backward Time-Stepping (FBTS) method is applied to microwave imaging wood defect detection application. …”
Get full text
Get full text
Thesis -
19
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Each technique increase speed and accuracy of the simulation itself but depending on application, we need to have specific solution of collision detection technique. …”
Get full text
Get full text
Conference or Workshop Item -
20
Systematic review of intrusion detection system based on machine learning techniques for internet of things
Published 2023“…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
Get full text
Get full text
Article
