Search Results - (( peer detection method algorithm ) OR ( java application path algorithm ))
Search alternatives:
- method algorithm »
- java application »
- application path »
- peer detection »
- path algorithm »
-
1
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
Get full text
Get full text
Thesis -
2
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
5
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
Outlier detection in circular regression model using minimum spanning tree method
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item -
16
-
17
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
18
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
19
-
20
A study on advanced statistical analysis for network anomaly detection
Published 2005Get full text
Monograph
