Search Results - (( developing function sensor algorithm ) OR ( java detection _ algorithm ))
Search alternatives:
- developing function »
- sensor algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
Get full text
Get full text
Conference or Workshop Item -
3
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…A surface exploration computer algorithm to obtain the sensing information was developed in order to analyse the characteristic of the optical tactile sensor. …”
Get full text
Get full text
Thesis -
4
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…This research aims to develop an effective and high-performance multi-sensor correlation algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…These approaches of clustering algorithms whether Distributed, Centralized, or Hybrid are reviewed very well, since the most of clustering algorithms have been developed by many researches based on these approaches. …”
Get full text
Get full text
Get full text
Article -
8
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
9
Line follower balbot
Published 2010“…This project focuses on the development of a line follower algorithm for a Balbot. …”
Get full text
Get full text
Undergraduates Project Papers -
10
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…Particle Swarm Optimization has been used in the proposed algorithm to minimize the fitness function. Voronoi diagram has also used in order to ensure that the mobile sensors cover the whole sensing field. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
12
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Efficient terrain coverage for deploying wireless sensor nodes on multi-robot system
Published 2016“…Developing an exploration algorithm based on spanning tree is the main contribution and this exploration algorithm is performing fast localization of sensor nodes in energy efficient manner. …”
Get full text
Get full text
Get full text
Article -
14
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
15
-
16
Development of a Sensor to Detect Condensation of Super-Sonic Steam
Published 2013“…This paper explains the development and functioning of AC driven electrodes based sensor which is used for the study of condensation phenomena of steam. …”
Get full text
Get full text
Get full text
Article -
17
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
18
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…Identification microcaicifications images application was developed to improve detection of microcaicifications efficiency in image quality and high detection efficiency in early detection environments. …”
Get full text
Get full text
Thesis -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
Get full text
Get full text
Thesis -
20
HDRA: A Haybird Data Reduction and Routing Algorithm
Published 2024“…Despite unresolved issues within WSNs, a substantial array of applications has already been developed. For any application design, a primary objective is to optimize the WSN in terms of its lifecycle and functionality. …”
Get full text
Get full text
Get full text
Article
