Search Results - (( java application sensor algorithm ) OR ( peer detection method algorithm ))*
Search alternatives:
- application sensor »
- java application »
- sensor algorithm »
- method algorithm »
- peer detection »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
3
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
4
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
5
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
-
9
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
Outlier detection in circular regression model using minimum spanning tree method
Published 2019Get full text
Get full text
Conference or Workshop Item -
16
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item -
17
-
18
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
19
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
20
