Search Results - (( java implementation a algorithm ) OR ( changes detection sensor algorithm ))

Refine Results
  1. 1

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Then, a collision detection algorithm is developed to calculate the potential of collision in future. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Human location estimation using thermopile array sensor by Parnin, Sulleha, Rahman, Md. Mozasser

    Published 2017
    “…The average changes in temperature of human is used as a conditional set-point value in the program algorithm to detect human presence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach by Phua, Mui How, Tsuyuki, Satoshi

    Published 2004
    “…The accuracy of detection was satisfactory that the algorithm was used in deforestation detection of the whole study area in two change periods i.e. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A review: radar-based fall detection sensor / Hidayatusherlina Razali ... [et al.] by Razali, Hidayatusherlina, Abd. Rashid, Nur Emileen, Nasarudin, Muhammad Nazrin Farhan, Ismail, Nor Najwa, Ismail Khan, Zuhani, Enche Ab Rahim, Siti Amalina

    Published 2024
    “…Fall detection sensors come in many varieties. However, the radar system is the most reliable detection method since it avoids the downsides of other sensors, such as discomfort, heavy computational processing, and privacy problems. …”
    Get full text
    Get full text
    Article
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Develop algorithm for change detection of the salinity from Landsat-8 images by Hasab, Hashim Ali, Ahmad, Anuar, Marghany, Maged, Ziboon, Abdul Razzak

    Published 2016
    “…The aims of this study to develop mathematical algorithms for the salinity change detection from Landsat-8 images. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…A surface exploration computer algorithm to obtain the sensing information was developed in order to analyse the characteristic of the optical tactile sensor. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  16. 16
  17. 17

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors which produces a measurable response to a change in a physical or chemical condition, e.g. temperature and ground composition. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Water Pollution Source Identification Based on Real-Time Monitoring System in Siak River by Kadir, E.A., Listia Rosa, S., Othman, M.

    Published 2021
    “…Data collected from the sensor analyzed use algorithm to find and check the abnormal and behavior data changing by the time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Adaptive edge detection and image filtering using light sensor by Ahmad Bakery, Mohd. Sarizal, Wan Ismail, Wan Ishak, Ramli, Abdul Rahman, Mustafa, Mohd. Marzuki, Razali, Mohd. Hudzari

    Published 2005
    “…An edge detection algorithm should be able to be use for all images captured in various environment conditions. …”
    Get full text
    Get full text
    Conference or Workshop Item