Search Results - (( java _ implementation algorithm ) OR ( parameter detection sensor algorithm ))

Refine Results
  1. 1

    Hybrid Graphene–Copper UWB Array Sensor for Brain Tumor Detection via Scattering Parameters in Microwave Detection System by Mohd Aminudin, Jamlos, Abdul Hafiizh, Ismail, Mohd Faizal, Jamlos, Narbudowicz, Adam

    Published 2017
    “…The sensor used for both transmits equivalent signal and receives backscattering signal from stratified human head model in detecting tumor. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan by Adenan, Muhammad Nasrul Hakim

    Published 2013
    “…Membrane acts as selector for the ions. The sensor detects the ions and converts it into electrical signal. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion by Ali, Mohammed A. H., Musa, Mailah, Jabbar, Waheb A., Moiduddin, Khaja, Ameen, Wadea, Alkhalefah, Hisham

    Published 2020
    “…A real-time roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion in a road environment is presented in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…Also, a scoring algorithm has been implemented, to evaluate the classification ability of the algorithm and the early fault detection ability. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Energy-efficient intrusion detection in wireless sensor network by Salehian, Solmaz, Masoumiyan, Farzaneh, Udzir, Nur Izura

    Published 2012
    “…Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Therefore, a new reference-free damage detection algorithm is proposed. The RWPE measurements of different sensor-to-sensor pairs are applied for defining the reference-free damage index (RDI) of each sensor location. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa'

    Published 2025
    “…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
    Get full text
    Get full text
    Article
  11. 11

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa’

    Published 2025
    “…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT by Malik, Ahmed Dhahir

    Published 2019
    “…This would allow the system to be more efficient and more reliable in detecting and monitoring the system’s parameters such as the state of sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Vision Based Multi Sensor Feedback System For Robot System With Intelligent by Syed Mohamad Shazali, Syed Abdul Hamid

    Published 2009
    “…One of the advantages of this research is that it only uses a low resolution camera and image processing software generated by the algorithms itself without additional sensors such as sonar or IR sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom, Sampe, Jahariah

    Published 2022
    “…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
    Get full text
    Get full text
    Article
  19. 19

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Reduced graphene oxide uwb array sensor : High performance for brain tumor imaging and detection by Mohd Aminudin, Jamlos, Mohd Faizal, Jamlos, Wan Azani, Mustafa, Nur Amirah, Othman, Mohamad Nur Khairul Hafizi, Rohani, Syahrul Affandi, Saidi, Mohd Sharizan, Md Sarip, Mohd Al Hafiz, Mohd Nawi

    Published 2023
    “…In order to accurately detect the tumor by producing sharper and clearer microwave image, the Matrix Laboratory software is used to improve the microwave imaging algorithm (delay and sum) including summing the imaging algorithm and recording the scattering parameters. …”
    Get full text
    Get full text
    Get full text
    Article