Search Results - (( programming does detection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- programming does »
- java application »
- does detection »
-
1
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
2
-
3
Obstacles Avoidance Mobile Robot
Published 2007“…Ultrasonic sensors will be the main device to collect all the information from the surrounding. The algorithm simply works by driving the robot forward until it detects an obstacle; once it does, it backs up, turns away and resumes moving forward. …”
Get full text
Get full text
Final Year Project -
4
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…In addition, this research does not require any pre-stored database to train the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A review of classification techniques for electromyography signals
Published 2023“…Normally, during rest our muscle tissue does not produce electrical signals. Machine Learning (ML) is an area of Artificial Intelligent (AI) with a concept that a computer program can learn and familiarize to new data without human intervention. …”
Get full text
Get full text
Get full text
Article -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
10
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
11
-
12
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
13
Identification and characterization of a novel Epstein-barr virus-encoded circular RNA from LMP-2 Gene / Tan Ke En
Published 2022“…Characterization of circLMP-2_e5 demonstrated that it was readily detected in a panel of EBV-positive cell lines modelling different latency programs, ranging from lower expression in NPC cells to higher expression in B cells and was localized to both cytoplasm and nucleus. …”
Get full text
Get full text
Get full text
Thesis -
14
