Search Results - (( java application sensor algorithm ) OR ( _ intention path algorithm ))
Search alternatives:
- application sensor »
- java application »
- sensor algorithm »
- intention path »
- path algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Analysis of Moderating Effect of Turnover Intention on the Relationship of Intrinsic Motivation and Employee Performance
Published 2024“…The first stage involved a bootstrapping process to generate and determine the significance level and strength of the path. The second stage employed the PLS Algorithm process, generating a simple slope graph. …”
Get full text
Get full text
Get full text
Article -
4
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
5
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
Published 2020“…Two algorithms are proposed, utilizing single-path and multipath in transmission flow. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
Get full text
Get full text
Thesis -
8
Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving
Published 2013“…New results are obtained within construction of problem solving systems where solution algorithms are derived parallel with other candidates applied to the same net classes. …”
Get full text
Get full text
Journal -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Cyber hygiene during Covid-19 to avoid cyber attacks
Published 2022“…After received the responds from participants, we had run the analysis on all the variables by using SmartPLS 3.3 and calculate the PLS-SEM algorithm of the variables. After running the analysis, we discuss our key findings using the results for each path's t-statistic and p-value. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Review of Kalman filter variants for SLAM in mobile robotics with linearization and covariance initialization
Published 2025“…This article aims to provide a comprehensive review of SLAM concept in the context of mobile robotics navigation by focusing on theoretical principles, estimation problem, algorithm involved and related application. The existing literature is systematically analyzed and classified based on three main perspectives of navigation which are localization, mapping and path planning. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Performance evaluation of manet in presence of black hole nodes
Published 2017“…In this type of attack, the black hole node uses the maximum destination sequence number to lure the sender node, to send packets via the shortest path, so that it will drop or alter the packets intentionally instead of sending them to the destination. …”
Get full text
Get full text
Thesis -
14
Image orientation watermarking technique for copyright protection
Published 2016“…Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis
