Search Results - (( java implementation during algorithm ) OR ( using active process algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- process algorithm »
- during algorithm »
- active process »
- using active »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Clustering chemical data set using particle swarm optimization based algorithm
Published 2008“…The main difference between these two data sets is measured in terms of the similarities quantify of bioactivities between active compounds. The results are compared with Ward’s algorithm in terms of proportion actives percentage in active clusters are. …”
Get full text
Get full text
Get full text
Thesis -
6
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
7
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
8
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
10
Image Analysis of Sludge Aggregates in Palm Oil Mill Effluent (POME)
Published 2015“…Palm oil mill effluent (POME) is a highly polluting material and activated sludge system is now commonly used for the process of purification of the wastewater. …”
Get full text
Get full text
Final Year Project -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
A Hybrid Active Contour and Artificial Bee Colony Algorithm for Segmenting Mixed-Meal Food Images (S/O: 13239)
Published 2020“…Active contour (snake) segmentation is extensively used in image processing and analysis applications particularly for identifying object boundaries. …”
Get full text
Get full text
Monograph -
13
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…A new algorithm has been developed to detect the presence of muscle activities in weak and noisy sEMG signals. …”
Get full text
Get full text
Conference or Workshop Item -
14
Multivariable PID controller design tuning using bat algorithm for activated sludge process
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Enhancement of stemming process for malay illicit web content
Published 2012“…There are six (6) phases included in web filtering process. One of them is pre-processing phase. In this phase, there are three main activities included; HTML parsing, stemming, and stopping. …”
Get full text
Get full text
Thesis -
16
-
17
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…The abnormal PPG pattern detection using rule-based algorithm has produced accuracy of 87.30% in training process and 87.18% in testing process with coverage of rule for training and testing, 89.26% and 87.33%. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Active power optimization based on non adaptive immune algorithm: article
Published 2010“…This paper presents a study of active power optimization based on non adaptive immune algorithm (NAIA) in power systems. …”
Get full text
Get full text
Article -
19
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023“…Different methods are used to control the active power filters. The reference current to be detected from the load current and processed by the active power filter controller is obtained from two different control algorithms, namely the Instantaneous Reactive Power Theory (PQ Theory) and Synchronous Reference Frame Theory (SRF Theory). …”
Conference paper -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis
