Search Results - (( java detection method algorithm ) OR ( program application sensor algorithm ))
Search alternatives:
- program application »
- application sensor »
- method algorithm »
- sensor algorithm »
- java detection »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The robotic model acts as a prototype or test-bed for programming execution. The model involves motorize movement, sensors detection and machine vision to be manipulated by the programmers inside their programs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
7
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
Get full text
Get full text
Article -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
Singular Value Thresholding Algorithm for Wireless Sensor Network Localization
Published 2020“…Since the location of the sensors is one of the most interesting issues in WSN, the process of node localization is crucial for any WSN-based applications. …”
Get full text
Article -
12
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…Data captured for this purpose is in the range of mass flow rates 26 g/s to 204 g/s. A Visual C++ programming language is used to develop an application program to compute the image reconstruction algorithms and display the tomograms which represent the concentration profiles at a measurement crosssection of the pipe. …”
Get full text
Get full text
Thesis -
13
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
14
-
15
-
16
Intelligent Energy Management in Residential Building
Published 2014Get full text
Get full text
Final Year Project -
17
Line follower balbot
Published 2010“…Hence, the system will immediately restore to the set point (balance position) through the implementation of internal PID algorithms at the balance board. Application of infra-red light sensors with the PID control is vital, in order to develop a smooth line follower robot. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…One of the advantages of this research is that it only uses a low resolution camera and image processing software generated by the algorithms itself without additional sensors such as sonar or IR sensor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours
Published 2024thesis::doctoral thesis
