Search Results - (( java application sensor algorithm ) OR ( its verification based algorithm ))
Search alternatives:
- application sensor »
- verification based »
- java application »
- sensor algorithm »
- its verification »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
3
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
4
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
-
9
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The literature proposes that an agent changes or updates its norms based on the variables of the local environment and the amount of thinking about its behaviour. …”
Short Survey -
10
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…The Halal Product Checker: Real-Time Ingredient Verification Application Using Text Scanning is an OCR (Optical Character Recognition) technology-based mobile application created to assist Muslims in ascertaining whether the ingredients in foods are halal. …”
Get full text
Get full text
Student Project -
11
Finger vein verification
Published 2009“…This trait offers a higher security because for gery is extremely difficult. The finger vein verification project verifies a person‟s identity based on the vein patterns. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
12
-
13
-
14
-
15
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
16
-
17
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…The multi-bases number representation is also applied to construct another new elliptic curve joint-scalar multiplication algorithm, called the joint-multi base algorithm. …”
Get full text
Get full text
Thesis -
18
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
Get full text
Get full text
Thesis -
19
Contactless palmprint verification using siamese networks
Published 2022“…Due to the COVID-19 pandemic, biometric based authentication systems have become increasingly in demand due to its ease of configuration and convenience of usage. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Enhanced face recognition using discrete cosine transform
Published 2016“…Appearance based techniques were also exploited for comparison with the new method, and results show that ‘ASDCT’ outperformed many renowned algorithms in the literature. …”
Get full text
Get full text
Get full text
Article
