Search Results - (( points detection system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- points detection »
- system algorithm »
- java application »
- using algorithm »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
3
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Moreover, it is very important that the algorithms should be general and not so complicated which could be implemented for all systems.Therefore, this research presents design and development of a novel method, which is called dual search maximum power point (DSMPP) algorithm, for tracking the GMPP under PSCs. …”
Get full text
Get full text
Thesis -
5
Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing
Published 2022“…YOLOv7 is chosen as the object detection algorithm to detect sun, while Q-learning is chosen as the algorithm for reinforcement learning to control the motors. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…In this research work, we report on new contributions to the major parts of a computer assisted stent positioning system. The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
Get full text
Get full text
Thesis -
8
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
9
-
10
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
13
Real-time system for facial emotion detection using GPSO algorithm
Published 2012Get full text
Working Paper -
14
Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application
Published 2016“…As a result, this application can detects real time kids‟ position with acceptable time but not in accuracy due to some signal problem of Wi-Fi access point.…”
Get full text
Get full text
Undergraduates Project Papers -
15
The application of Hough Transform for corner detection
Published 2006“…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
3D LiDAR Vehicle Perception and Classification Using 3D Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
20
Weeds detection for agriculture using Convolutional Neural Network (CNN) algorithm / Khairun Nisa Mohammad Nasir
Published 2024“…Modern agriculture recognizes weed detection systems as crucial tools to reduce the obstacles caused by weeds, enhancing crop growth and yield. …”
Get full text
Get full text
Thesis
