PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact


Search


PDF Archive search engine
Last database update: 30 October at 08:47 - Around 210000 files indexed.

Show results per page

Results for «detect»:


Total: 4000 results - 0.063 seconds

Fraud Detection and Prevention Market 97%

https://kbvresearch.com/fraud-detection-and-prevention-market/ kbv Research | +1 (646) 661-6066 | query@kbvresearch.com Market Dynamics – Global Fraud Detection and Prevention Market About Global Fraud Detection and Prevention Market Fraud detection and prevention systems are software applications used in providing analytical solutions to detect and prevent fraud in uncertain conditions.

https://www.pdf-archive.com/2017/09/25/fraud-detection-and-prevention-market/

25/09/2017 www.pdf-archive.com

Emotion Detection and Recognition Market 97%

Initially, the EDR systems were employed by law enforcement and surveillance departments to detect lie and polygraph tests.

https://www.pdf-archive.com/2017/12/13/emotion-detection-and-recognition-market/

13/12/2017 www.pdf-archive.com

Spijunska oprema 97%

The detective you employ should have license to perform investigation and detect instances.

https://www.pdf-archive.com/2018/06/01/spijunska-oprema/

01/06/2018 www.pdf-archive.com

IJETR2196 97%

asserts that CRs must continuously sense the spectrum in use in order to detect re-appearance of a primary user.

https://www.pdf-archive.com/2017/09/09/ijetr2196/

09/09/2017 www.pdf-archive.com

Water leak detection Specialists2 96%

*Trace gas leak detection equipment Trace Gas is non-toxic and will not harm any piping or environment and it is employed to detect leaks on all pipework, including under floor heating systems.

https://www.pdf-archive.com/2016/03/21/water-leak-detection-specialists2/

21/03/2016 www.pdf-archive.com

IJETR2247 96%

In [11], the authors have developed a system where the robotic platform uses a visual camera to sense the movement of the desired object and a range sensor to help the robot to detect and ovoid obstacles in real time while continuing to detect and follow the desired object.

https://www.pdf-archive.com/2017/09/09/ijetr2247/

09/09/2017 www.pdf-archive.com

Arlo Camera Keeps Going Offline +1-888-508-3786 96%

However, sometimes because of any technical reasons Arlo Camera motion detection stops working and not able to detect any kind of motion to record sudden moves.

https://www.pdf-archive.com/2018/09/10/arlo-camera-keeps-going-offline-1-888-508-3786/

10/09/2018 www.pdf-archive.com

Computer Aided Detection Market 96%

Computer Aided Detection Market: Trends Analysis &

https://www.pdf-archive.com/2018/05/03/computer-aided-detection-market/

03/05/2018 www.pdf-archive.com

19I14-IJAET0514318 v6 iss2 730to736 95%

Intrusion detection systems are used to detect unauthorized access to a computer system.

https://www.pdf-archive.com/2013/05/13/19i14-ijaet0514318-v6-iss2-730to736/

13/05/2013 www.pdf-archive.com

Fire Protection Systems 95%

FIRE PROTECTION SYSTEMS 11th &

https://www.pdf-archive.com/2011/03/22/fire-protection-systems/

22/03/2011 www.pdf-archive.com

Willems09a 95%

How to detect human fall in video?

https://www.pdf-archive.com/2016/10/06/willems09a/

06/10/2016 www.pdf-archive.com

44I14-IJAET0514282 v6 iss2 954to960 95%

KDD Process The quality of data plays vital role to detect results from the larger database.

https://www.pdf-archive.com/2013/05/13/44i14-ijaet0514282-v6-iss2-954to960/

13/05/2013 www.pdf-archive.com

6N19-IJAET0319318 v7 iss1 59-65 95%

The method uses two thresholds, to detect strong and weak edges, and includes the weak edges in the output only if they are connected to strong edges.

https://www.pdf-archive.com/2014/07/04/6n19-ijaet0319318-v7-iss1-59-65/

04/07/2014 www.pdf-archive.com

26I17-IJAET1117400 v6 iss5 2187-2195 94%

Integration of different soft computing techniques like neural network (NN), genetic algorithm (GA), and decision tree (DT) has lead to discovery of useful knowledge to detect and prevent intrusion on the basis of observed activity.

https://www.pdf-archive.com/2014/07/04/26i17-ijaet1117400-v6-iss5-2187-2195/

04/07/2014 www.pdf-archive.com

IJETR2177 94%

Integro-differential operators are used to detect the center and diameter of the iris.

https://www.pdf-archive.com/2017/09/09/ijetr2177/

09/09/2017 www.pdf-archive.com

A client-side detection mechanism for evil twins 94%

Wireless Evil twin Rogue AP Wi-Fi a b s t r a c t In this paper, we propose a client-based solution to detect “evil twin” attacks in wireless local area networks (WLANs).

https://www.pdf-archive.com/2016/05/23/a-client-side-detection-mechanism-for-evil-twins/

23/05/2016 www.pdf-archive.com

Copy tag