Search Results - (( java location based algorithm ) OR ( pattern detection force algorithm ))
Search alternatives:
- pattern detection »
- detection force »
- force algorithm »
- java »
-
1
-
2
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…This thesis proposes a real time gait phase detection system to control AAFO for rehabilitation and assist ankle motion. …”
Get full text
Get full text
Thesis -
3
A new split based searching for exact pattern matching for natural texts
Published 2018“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Get full text
Article -
4
-
5
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
6
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
9
Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias
Published 2021“…This feature makes it suitable to detect the pattern of head movement and hence a call bell for patients with special needs.…”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
12
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Spectral Estimation And Supervised Classification Technique For Real Time Electromyography Pattern Recognition
Published 2018“…Electromyography (EMG) signal is a biomedical signal which measures physical activity of human muscle.It has been acknowledged to be widely used in rehabilitation or recovery application system assisting physiotherapist to monitor a patient’s physical strength,function,motion and overall well-being by addressing the underlying physical issues.In application system associated with rehabilitation,a signal processing and classification techniques are implemented to classify EMG signal obtained.For real time application in the rehabilitation, the classification is crucial issue.The success of the signal classification depends on the selection of the features that represent a raw EMG signal in the signal processing.Therefore,a robust and resilient denoising method and spectral estimation technique have been acknowledged as necessary to distinguish and detect the EMG pattern.The present study was undertaken to determine the characteristic of EMG features using denoising method and spectral estimation technique for assessing the EMG pattern based on a supervised classification algorithm.In the study,the combination of time-frequency domain (TFD) and time domain (TD) were identified as the preferred denoising method and spectral estimation techniques.In the first part of study, the recorded EMG signal filtered the contaminated noise by using wavelet transform (WT) approach which implemented discrete wavelet transform (DWT) method of the wavelet-denoising signal. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Enhanced faster region-based convolutional neural network for oil palm tree detection
Published 2021“…Hence, this research aims to close the research gaps by exploring the deep learning-based object detection algorithm and the classical convolutional neural network (CNN) to build an automatic deep learning-based oil palm tree detection and counting framework. …”
Get full text
Get full text
Thesis -
16
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis
