Search Results - (( java location based algorithm ) OR ( _ constructing detection algorithm ))
Search alternatives:
- constructing detection »
- _ constructing »
- java »
-
1
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
-
6
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Effect Of The Addition Of Wastepaper To Concrete Mix
Published 2009Get full text
Get full text
Thesis -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
A tool for addressing construct identity in literature reviews and meta-analyses
Published 2016“…All six designs were found capable of detecting construct identity, and a design combining two existing algorithms significantly outperformed the other approaches. …”
Get full text
Get full text
Get full text
Article -
11
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Based on You Only Look Once (YOLO) v5, A cloud-based real-time hardhat-wearing compliance detection system was proposed to detect workers not wearing hardhats in power construction sites. …”
Get full text
Get full text
Thesis -
13
Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework
Published 2019“…This paper proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community detection algorithm in graph analytics for representing relationship in supply chain network based on external and internal quality analysis. …”
Get full text
Get full text
Get full text
Article -
14
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
16
Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim
Published 2018“…These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
Get full text
Get full text
Thesis -
17
Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli
Published 2023“…The project utilizes the You Only Look Once (YOLO) algorithm as the detection algorithm, namely version 5. …”
Get full text
Get full text
Thesis -
18
COMPUTERIZED SEGMENTATION OF SINUS IMAGES
Published 2009“…Multilevel thresholding algorithms were developed to segment the images into meaningful regions for the detection of sinusitis. …”
Get full text
Get full text
Final Year Project -
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
Get full text
Get full text
Student Project
