Search Results - (( program during does algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- does algorithm »
- during does »
-
1
-
2
Midblock signalled pedestrian crossing : alternative controller algorithms
Published 2000“…The measures of performance of all algorithms are evaluated using a fully calibrated and validated simulation program. …”
Get full text
Get full text
Get full text
Article -
3
A review of classification techniques for electromyography signals
Published 2023“…To detect neuromuscular abnormalities, these test is very useful.EMG can measures the electrical activity of muscle during rest, slight and forceful contraction. Normally, during rest our muscle tissue does not produce electrical signals. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Off-the-shelf indoor localization system using radio frequency for wireless local area network
Published 2018“…The location fingerprinting algorithm consists of two phases: offline phase and online phase. …”
Get full text
Get full text
Thesis -
6
-
7
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
9
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…The key semantic difference between FEs and DDoS is that the former represents legitimate access of the website while the latter does not. However, this does not help in discriminating them automatically. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Multi-sensor fusion for automated guided vehicle positioning
Published 2010“…Radio frequency module is used to transfer sensors reading from the mobile robot to a host PC has software program written on LabVIEW, which has a positioning algorithm and graphical display for robot position. …”
Get full text
Get full text
Get full text
Thesis
