Search Results - (( frames constructing system algorithm ) OR ( java application during algorithm ))
Search alternatives:
- constructing system »
- application during »
- system algorithm »
- java application »
- during algorithm »
- frames »
-
1
Development of obstable avoidance system for 3D robot navigation
Published 2024“…To prepare for obstacle avoidance algorithm development, a differential drive robot was constructed, and a URDF description was prepared to ensure correct odometry data conversion from sensor coordinate frames to the robot coordinate frame. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Optimization of Off-Centre bracing system using Genetic Algorithm
Published 2011Get full text
Get full text
Article -
3
Two-dimensional burst construction with QoS assurance for OFDMA mobile WiMAX system
Published 2014“…For multiuser environments, IEEE 802.16 OFDMA systems require a resource allocation algorithm to use the limited downlink resource efficiently. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of finite element model for soil-structure interaction
Published 2014“…Nonlinear interactive analysis of an asymmetric frame in the current study showed 26% increase in the required volume of reinforced concrete for construction of the frame. …”
Get full text
Get full text
Thesis -
5
-
6
Development of a scalable video compression algorithm
Published 2012“…To improve the perceptual quality of coded video in a computation-constrained scenario, through controlling per-frame complexity, a rate-distortion optimised (RDO) rate control algorithm for encoding low bit rate video helped to achieve the target bitrates and PSNR using Lagrangian multiplier function. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Real-time shadow casting using fake soft shadow volume with stencil buffer
Published 2006“…Results from various tests reveal that the proposed algorithm not only achieves better frame per second performance but also maintains the quality of soft shadows. …”
Get full text
Get full text
Thesis -
8
-
9
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
10
Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process
Published 2017“…The main mechanism of the solar tracking system consists of the tracking device, tracking algorithm, control unit, positioning system, driving mechanism and sensing devices. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Analytical model for partially prestressed concrete beam-column elements
Published 2017“…From the experimental PPC frame results, the lateral load capacity and stiffness improved up to 34 % and 17 % compared to the RC frame. …”
Get full text
Get full text
Get full text
Thesis -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
-
15
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…BL can be decoded to construct the original video with basic quality and EL is used to improve the quality of BL. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
Design and development of latex mark visual detection system
Published 2025Get full text
Get full text
Get full text
Article -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
