Search Results - (( java application sensor algorithm ) OR ( after implementation case algorithm ))
Search alternatives:
- after implementation »
- implementation case »
- application sensor »
- java application »
- sensor algorithm »
- case algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
IMPLEMENTATION OF A TIME SERIES PREDICTION ALGORITHM FOR COVID-19 CONFIRMED CASES IN MALAYSIA : A PRELIMANARY STUDY AFTER THE RECOVERY MOVEMENT CONTROL ORDER
Published 2020Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
4
Multi-objective optimisation of assembly line balancing type-e problem with resource constraints
Published 2016“…The validation phase from the industrial case study concluded that the proposed methodology and algorithm can be implemented in industries. …”
Get full text
Get full text
Thesis -
5
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…Now and after got this results as low delay for bottleneck link case, we know the New-AIMD mechanism work as well under the network condition in the experiments.…”
Get full text
Get full text
Article -
7
Cyberbullying detection: a machine learning approach
Published 2022“…The machine learning algorithm, Support Vector Machine was chosen after comparing it with other algorithms such as Multinomial Naïve Bayes, Decision Tree Classifier, and Random Forest Classifier. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60
Published 2009“…The programming language used in this project is Mobile Python or PyS60 and the written source code is executed on the S60 device mobile platform, whic h is the Nokia N95 in this case. Experimental results are obtained through test s conducted and after several analyses; it is found out that RGB - H - CbCr presents the best algorithm to be used in e xtracting the human skin colour, after a slight modification.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
10
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
11
-
12
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…Based on literature, stereo algorithm is already being implemented to solve the distance measurement problem. …”
Get full text
Get full text
Thesis -
13
-
14
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
15
Automated call receiving and forwarding mechanism for supporting integrated disaster management system
Published 2014“…The efficiency of the algorithm is evaluated by comparing the response time of the current procedures with the implementation of the algorithm in the proposed prototype. …”
Get full text
Get full text
Conference or Workshop Item -
16
Performance study of adaptive filtering algorithms for noise cancellation of ECG signal
Published 2023“…In this paper, the four types of AC and DC noises have been implemented according to their basic properties. After that, these noises have been mixed with ECG signal and nullify these noises using the LMS and the RLS algorithms. …”
Conference paper -
17
Automated call receiving and forwarding mechanism for supporting integrated disaster management system
Published 2014“…The efficiency of the algorithm is evaluated by comparing the response time of the current procedures with the implementation of the algorithm in the proposed prototype. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
20
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
Get full text
Get full text
Thesis
