Search Results - (( java implementation level algorithm ) OR ( using vector sensor algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- sensor algorithm »
- level algorithm »
- vector sensor »
-
1
Distance vector-hop range-free location algorithm for wireless sensor network
Published 2015“…Distance Vector-Hop (DV-Hop) algorithm has become the focus of studies for range-free localization algorithms. …”
Get full text
Get full text
Thesis -
2
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
Published 2015“…This research explores path integration in mobile robot navigation and path optimization technique using vector calculus. A simulated robot in a simulated environment is used to test the algorithm that is to be developed. …”
Get full text
Get full text
Get full text
Article -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
4
Flood Control Distance Vector Hop (FCDV-Hop) localization in wireless sensor networks
Published 2020“…Distance Vector-Hop (DV-Hop) localization is a distributed, hop by hop positioning algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Published 2009“…This paper describes a preliminary study on wireless sensor network (WSN) routing protocol algorithm with focus on energy saving strategy.Efficient energy saving and consumption will ensure the lifespan of the battery are prolonged and the delay of transmitting data will be within the acceptable range of 300 meter by 300 meter network size.The routing protocol Ad-hoc On Demand Distance Vector (AODV), Destination Sequence Distance Vector (DSDV) and Energy Efficient Destination Sequence Distance Vector (EE-DSDV) were used in the study to compare the performance of the network in terms of maximum delay, throughput receive as well as the remaining energy in the network.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A distributed particle filtering approach for multiple acoustic source tracking using an acoustic vector sensor network
Published 2015“…Different centralized approaches such as least-squares (LS) and particle filtering (PF) algorithms have been developed to localize an acoustic source by using a distributed acoustic vector sensor (AVS) array. …”
Get full text
Get full text
Get full text
Article -
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Sensor-less vector control using adaptive observer scheme for controlling the performance of the induction motor / Mazhar Hussain Abbasi
Published 2013“…Sensorless vector control technique using adaptive observer scheme is being used to control the performance of induction motor which is demonstrated by the help of matlab/simulink software; a suitable tool for vector control of AC motor. …”
Get full text
Get full text
Thesis -
9
-
10
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
11
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
12
-
13
Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset
Published 2020“…However, they have their useful lives and will degrade over time. This issue prompts to be solved using predictive analytics to predict the Remaining Useful Life (RUL) of equipment. …”
Get full text
Get full text
Article -
14
Spacecraft sun-pointing using coplanar solar panels data and magnetic field measurements
Published 2013“…The goal of this paper is to develop an algorithm for sun vector estimation without any explicit measurements from sun sensors. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Development of a Robust Wireless Sensor Mesh and Multi-hop Network
Published 2012“…The existing routing algorithms used are the XMESH and Ad-Hoc On-Demand Vector Routing (AODV).…”
Get full text
Get full text
Final Year Project -
16
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
17
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Object Recognition Using Soft Sensors
Published 2021“…However, there is a lack of study to equip the soft sensors with a smart feature. Therefore, this study proposes a smart glove that can recognise objects using a support vector machine (SVM), a supervised machine learning algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
