Search Results - (( java implementation model algorithm ) OR ( changes detection sensor algorithm ))
Search alternatives:
- implementation model »
- java implementation »
- changes detection »
- detection sensor »
- sensor algorithm »
- model algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
3
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…Then, a collision detection algorithm is developed to calculate the potential of collision in future. …”
Get full text
Get full text
Thesis -
4
-
5
Human location estimation using thermopile array sensor
Published 2017“…The average changes in temperature of human is used as a conditional set-point value in the program algorithm to detect human presence. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT
Published 2019“…The system has a fault in a sensor when the correlation values between sensors are changed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
8
Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach
Published 2004“…The accuracy of detection was satisfactory that the algorithm was used in deforestation detection of the whole study area in two change periods i.e. …”
Get full text
Get full text
Get full text
Article -
9
A review: radar-based fall detection sensor / Hidayatusherlina Razali ... [et al.]
Published 2024“…Fall detection sensors come in many varieties. However, the radar system is the most reliable detection method since it avoids the downsides of other sensors, such as discomfort, heavy computational processing, and privacy problems. …”
Get full text
Get full text
Article -
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
11
Develop algorithm for change detection of the salinity from Landsat-8 images
Published 2016“…The aims of this study to develop mathematical algorithms for the salinity change detection from Landsat-8 images. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…A surface exploration computer algorithm to obtain the sensing information was developed in order to analyse the characteristic of the optical tactile sensor. …”
Get full text
Get full text
Thesis -
14
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
15
-
16
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
17
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
18
Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle
Published 2018“…In this paper, a combination of both sensors based is proposed for a small UAV obstacle detection system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors which produces a measurable response to a change in a physical or chemical condition, e.g. temperature and ground composition. …”
Get full text
Get full text
Thesis -
20
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper
