Search Results - (( java implementation some algorithm ) OR ( programming using sensor algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- sensor algorithm »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017“…The main contribution of the paper is to introduce a dynamic programming algorithm, which defines an optimal policy for solving the visual sensor coverage problem. …”
Get full text
Get full text
Article -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
WSN sensor node placement approach using Territorial Predator Scent Marking Algorithm (TPSMA)
Published 2023“…The performance of the proposed technique is then compared with other two sensor node placement schemes that are based on Integer Linear Programming (ILP) in terms of coverage ratio, connectivity and energy consumption. …”
Conference paper -
6
Multi-objective biological mimicry optimization algorithm for WSN sensor node placement
Published 2023Conference Paper -
7
Ultrasonic parking sensors using triangulation algorithm / Mohamad Syahzmeer Mohamed Sufian
Published 2019“…This work presents the design and implementation of ultrasonic parking sensors using the triangulation algorithm. Multiple surveys recorded in the past indicated that there are substantial amounts of backover crash incidents that occurs between vehicles and pedestrians. …”
Get full text
Get full text
Student Project -
8
Sensor Node Placement in Wireless Sensor Network Using Multi-objective Territorial Predator Scent Marking Algorithm
Published 2023“…Simulation results show that WSN deployed using the MOTPSMA sensor node placement algorithm outperforms the performance of the other two algorithms in terms of coverage, connectivity and energy usage. © 2014 King Fahd University of Petroleum and Minerals.…”
Article -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior
Published 2023“…Simulation results show that the WSN deployed using the proposed TPSMA sensor node placement algorithm is able to arrange the sensor nodes according to the objective required; TPSMA with maximum coverage offers the highest coverage ratio with fewer sensor nodes up to 100% coverage while TPSMA with minimum energy consumption utilized the lowest energy as low as around 4.85 Joules. …”
Article -
13
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
Get full text
Get full text
Article -
14
-
15
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
Get full text
Get full text
Thesis -
16
-
17
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
19
Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms
Published 2023Conference Paper -
20
Maze Mouse
Published 2004“…The chosen microcontroller is Intel 8031 and had to be programmed by using the ASM51.The third block is the stepper motor. …”
Get full text
Get full text
Final Year Project
