Search Results - (( java implementation during algorithm ) OR ( using beta process algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- process algorithm »
- during algorithm »
- beta process »
- using beta »
-
1
G2 parametric curve and surface fitting using beta-spline / Normi Abdul Hadi
Published 2015“…The results are then compared with the another technique using Bspline in terms of total processing time, approximation error, and the number of computation in the algorithm. …”
Get full text
Get full text
Thesis -
2
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
7
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
8
-
9
Dental Age Estimation Using a Convolutional Neural Network Algorithm on Panoramic Radiographs: A Pilot Study in Indonesia
Published 2025journal::journal article -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
-
12
Application of minimax algorithm in dots and boxes game
Published 2025“…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption processes. …”
Get full text
Get full text
Thesis -
16
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
Get full text
Get full text
Article -
17
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…This update process may cause the algorithm to fall to local optima especially in the cases where there are many competing local optima. …”
Get full text
Get full text
Thesis -
19
Brain signatures: a modality for biometric authentication
Published 2009Get full text
Working Paper -
20
Optimization of operating cost and energy consumption in a smart grid
Published 2024“…The stochastic nature of wind and solar resources is characterized by modeling wind speed and solar radiation intensity using a beta probability density function (PDF). …”
Get full text
Get full text
Article
