Search Results - (( java implementation _ algorithm ) OR ( using vector sensor algorithm ))
Search alternatives:
- java implementation »
- sensor algorithm »
- vector sensor »
-
1
Distance vector-hop range-free location algorithm for wireless sensor network
Published 2015“…Distance Vector-Hop (DV-Hop) algorithm has become the focus of studies for range-free localization algorithms. …”
Get full text
Get full text
Thesis -
2
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
Published 2015“…This research explores path integration in mobile robot navigation and path optimization technique using vector calculus. A simulated robot in a simulated environment is used to test the algorithm that is to be developed. …”
Get full text
Get full text
Get full text
Article -
3
Flood Control Distance Vector Hop (FCDV-Hop) localization in wireless sensor networks
Published 2020“…Distance Vector-Hop (DV-Hop) localization is a distributed, hop by hop positioning algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Published 2009“…This paper describes a preliminary study on wireless sensor network (WSN) routing protocol algorithm with focus on energy saving strategy.Efficient energy saving and consumption will ensure the lifespan of the battery are prolonged and the delay of transmitting data will be within the acceptable range of 300 meter by 300 meter network size.The routing protocol Ad-hoc On Demand Distance Vector (AODV), Destination Sequence Distance Vector (DSDV) and Energy Efficient Destination Sequence Distance Vector (EE-DSDV) were used in the study to compare the performance of the network in terms of maximum delay, throughput receive as well as the remaining energy in the network.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
A distributed particle filtering approach for multiple acoustic source tracking using an acoustic vector sensor network
Published 2015“…Different centralized approaches such as least-squares (LS) and particle filtering (PF) algorithms have been developed to localize an acoustic source by using a distributed acoustic vector sensor (AVS) array. …”
Get full text
Get full text
Get full text
Article -
7
Sensor-less vector control using adaptive observer scheme for controlling the performance of the induction motor / Mazhar Hussain Abbasi
Published 2013“…Sensorless vector control technique using adaptive observer scheme is being used to control the performance of induction motor which is demonstrated by the help of matlab/simulink software; a suitable tool for vector control of AC motor. …”
Get full text
Get full text
Thesis -
8
-
9
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
10
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
11
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
12
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
13
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
14
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset
Published 2020“…However, they have their useful lives and will degrade over time. This issue prompts to be solved using predictive analytics to predict the Remaining Useful Life (RUL) of equipment. …”
Get full text
Get full text
Article -
17
Spacecraft sun-pointing using coplanar solar panels data and magnetic field measurements
Published 2013“…The goal of this paper is to develop an algorithm for sun vector estimation without any explicit measurements from sun sensors. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
19
Development of a Robust Wireless Sensor Mesh and Multi-hop Network
Published 2012“…The existing routing algorithms used are the XMESH and Ad-Hoc On-Demand Vector Routing (AODV).…”
Get full text
Get full text
Final Year Project -
20
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
