Search Results - (( java implementation during algorithm ) OR ( data implementation force algorithm ))
Search alternatives:
- implementation during »
- implementation force »
- java implementation »
- data implementation »
- during algorithm »
- force algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The output data display in array is implement to display in two dimension array with X-axis direction and Yaxis direction.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The model was tested using an untrained input data set in order to verify the Proposed model’s capability for implementing a self-calibration algorithm. …”
Get full text
Get full text
Thesis -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
6
Development of a robotic hand glove system for secure grasp with AI wireless sensor data
Published 2023“…It is composed of five low-cost force sensors attached to the glove’s fingertips and wireless data logger. …”
Get full text
Get full text
Conference or Workshop Item -
7
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…The data is then sent to a Gmail as a storage by developing algorithm in Wi-Fi module NodeMCU ESP8266. …”
Get full text
Get full text
Final Year Project -
13
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
15
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
16
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…First, the new data compression algorithm is proposed for compressing sensed data before it gets transmitted to the sink. …”
Get full text
Get full text
Get full text
Thesis -
17
Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid
Published 2010“…The personal computer is for generating the outputs/inputs signals, from MATLAB/SIMULINK software package, to the data acquisition board. SIMULINK is integrated with MATLAB, providing immediate access to an extensive range of tools that can develop algorithms, analyze and visualize simulations, customize the modeling environment, define signal, parameter, and test data. …”
Get full text
Get full text
Thesis -
18
Financial time series predicting using machine learning algorithms
Published 2013“…Subsequently, Dynamic Time Warping (DTW) algorithm is utilised through brute force to predict the trend movement. …”
Get full text
Thesis -
19
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
20
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
Get full text
Get full text
Get full text
Get full text
Thesis
