Search Results - (( developing detector generating algorithm ) OR ( java application designing algorithm ))
Search alternatives:
- application designing »
- generating algorithm »
- designing algorithm »
- java application »
- detector »
-
1
-
2
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Performance study of Reference Height Control Algorithm for Tripod Hopping Robot
Published 2013“…The proposed algorithm is designed using MATLAB/ Simulink which is consisted of maximum height detector, PI controller in the system of Central Pattern Generator (CPG). …”
Get full text
Get full text
Article -
7
-
8
PLL-less SRF technique for operation of SAPF under unbalanced and distorted supply voltage
Published 2018“…Therefore, this paper presents a PLL-less SRF algorithm for generating reference current to effectively control performance of a SAPF developed based on three-level neutral-point-clamped (NPC) inverter. …”
Get full text
Get full text
Conference or Workshop Item -
9
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
10
Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes
Published 2023Conference Paper -
11
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Daily rainfall prediction using clonal selection algorithm
Published 2012“…The common use of Clonal Selection Algorithm is to randomly generate the antibodies in the population. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Unified neural network controller of series active power filter for power quality problems mitigation
Published 2013“…The amplitude value of the fundamental component is measured and saved by the second unit called peak detector. Furthermore, it is unified with a phase-locked loop (PLL) based reference generator unit to generate proper compensation signal for present faults at voltage supply fundamental signal caused by source-end disturbances. …”
Get full text
Get full text
Thesis -
15
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
16
-
17
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
18
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
19
An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa
Published 2020“…The algorithm framework consists of hybrid of improved Xception model and YOLO V2 detector to classify the PF slices with ischemic and localise the infarction in classified slices, respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Focal and non-focal epilepsy localization: a review
Published 2018“…Finally, the researchers noted that all the methods that were developed for epileptic seizure detection lacks standardization, which hinders the homogeneous comparison of the detector performance.…”
Get full text
Get full text
Get full text
Article
