Search Results - (( java implementation during algorithm ) OR ( data implementation force algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…The output data display in array is implement to display in two dimension array with X-axis direction and Yaxis direction.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Real time self-calibration algorithm of pressure sensor for robotic hand glove system by Almassri, Ahmed M. M.

    Published 2019
    “…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of a robotic hand glove system for secure grasp with AI wireless sensor data by Almassri, Ahmed, Koyanagi, Ken'ichi, Wada, Chikamune, Horio, Keiichi, Wan Hasan, Wan Zuha

    Published 2023
    “…It is composed of five low-cost force sensors attached to the glove’s fingertips and wireless data logger. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The data is then sent to a Gmail as a storage by developing algorithm in Wi-Fi module NodeMCU ESP8266. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…First, the new data compression algorithm is proposed for compressing sensed data before it gets transmitted to the sink. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid by Khalid, Mohd. Aizuddin

    Published 2010
    “…The personal computer is for generating the outputs/inputs signals, from MATLAB/SIMULINK software package, to the data acquisition board. SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Financial time series predicting using machine learning algorithms by Tiong, Leslie Ching Ow *

    Published 2013
    “…Subsequently, Dynamic Time Warping (DTW) algorithm is utilised through brute force to predict the trend movement. …”
    Get full text
    Thesis
  19. 19

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis