Search Results - (( frames realization _ algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- frames »
-
1
Damage detection in frame structures using noisy accelerometers and Damage Load Vectors (DLV)
Published 2020“…The Eigen Realization Algorithm (ERA) alongside Pandy's recommendations was adopted herein to facilitate the generation of accurate exibility matrices derived from the noisy accelerometers. …”
Get full text
Get full text
Article -
2
Damage detection in frame structures using noisy accelerometers and Damage Load Vectors (DLV)
Published 2020“…The Eigen Realization Algorithm (ERA) alongside Pandy's recommendations was adopted herein to facilitate the generation of accurate exibility matrices derived from the noisy accelerometers. …”
Get full text
Get full text
Article -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Multi-target tracking algorithm in intelligent transportation based on wireless sensor network
Published 2018“…A multi-target tracking algorithm using wireless sensors in an intelligent transportation system is proposed. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Automatic pan-tilt camera positioning system for motion tracking
Published 2004“…A pan-tilt camera positioning system has been developed to meet the characteristics of the motion tracking algorithm and some other hardware constraints. The technique implemented to realize the pan-tilt camera positioning system is an open-loop control called coordinate to motion unit translation. …”
Get full text
Get full text
Thesis -
6
Two-dimensional burst construction with QoS assurance for OFDMA mobile WiMAX system
Published 2014“…For multiuser environments, IEEE 802.16 OFDMA systems require a resource allocation algorithm to use the limited downlink resource efficiently. …”
Get full text
Get full text
Conference or Workshop Item -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Towards Enhancing the Performance of Grid-Tied VSWT via Adopting Sine Cosine Algorithm-Based Optimal Control Scheme
Published 2021“…This paper is aimed at introducing a novel application of the sine cosine algorithm (SCA) which attempts to find the optimal gains of proportional-integral (PI) controllers used to control the power electronic converters (PEC) equipped with the variable speed wind turbine (VSWT) such that a maximum power extraction and performance enhancement can be realized. …”
Get full text
Get full text
Article -
9
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. Afterwards, an SoC for real-time video analytics is realized on Zynq using Harris corner detection algorithm. …”
Get full text
Get full text
Thesis -
10
Modeling and Simulation of Active Attitude Control for Satellites
Published 2004“…In other words, a poor pointing accuracy with respect to the orbiting reference frame. The second phase of this thesis focuses on the design of a control algorithm used to damp the satellite oscillations around its equilibrium position with a simple hardware setting added to the satellite. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
A quality of experience approach in smartphone video selection framework for energy efficiency
Published 2021“…This process manages the video attribute such as brightness, resolution, and frame rate by turning to Video Content Selection (VCS). …”
Get full text
Get full text
Get full text
Get full text
Thesis
