Search Results - (( java implementation from algorithm ) OR ( program evaluation sensor algorithm ))
Search alternatives:
- java implementation »
- implementation from »
- evaluation sensor »
- sensor algorithm »
- from algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
-
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
Get full text
Get full text
Article -
5
Logic Algorithm for contour following task: An evaluation using Adept SCARA Robot
Published 2010“…This paper presents the performance evaluation of logic algorithms for contourfollowing task in order to automate the manual programming process. …”
Get full text
Get full text
Article -
6
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
Get full text
Get full text
Thesis -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
9
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
10
Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems
Published 2018“…The obtained solutions from the dynamic programming technique are evaluated with respect to local and global greedy search algorithms. …”
Get full text
Get full text
Article -
11
Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems
Published 2018“…The obtained solutions from the dynamic programming technique are evaluated with respect to local and global greedy search algorithms. …”
Get full text
Get full text
Article -
12
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Algorithm conversion to C code programming has been done throughout the project for the obstacle avoidance and path planning algorithms based upon the GA platform ofAI.…”
Get full text
Get full text
Final Year Project -
13
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Then, developed code is programmed into TelosB radio sensors boards in WSN test beds. …”
Get full text
Get full text
Thesis -
15
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
17
Quality checking and inspection based on machine vision technique to determine tolerancevalue using single ceramic cup
Published 2017“…Illumination and surrounding environment were considered during the design as it may affect the quality of image acquisitioned by image sensor. Experiment and set-up by using CMOS image sensor were conducted to test the designed algorithm for effectiveness evaluation. …”
Get full text
Get full text
Get full text
Article -
18
Quality checking and inspection based on machine vision technique to determine tolerance value using single ceramic cup
Published 2016“…Illumination and surrounding environment were considered during the design as it may affect the quality of image acquisitioned by image sensor. Experiment and set-up by using CMOS image sensor were conducted to test the designed algorithm for effectiveness evaluation. …”
Get full text
Get full text
Get full text
Article -
19
Power consumption and size minimization of a wireless sensor node in automation system application
Published 2015“…Starting from a MATLAB programming language code, we develop algorithms and node configuration in such a way that the analogue sensor signal, the processing and analysis area accomplished without using microcontroller, but only the XBee RF modules with 1+0.3 mWatt power consumption. …”
Get full text
Get full text
Conference or Workshop Item -
20
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis
