Search Results - (( safety implementation level algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- safety implementation »
- implementation level »
- java application »
- level algorithm »
-
1
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…By implementing definitions of safety and health on the identified extreme and high-risk levels, the key risks in this study have been classified into safety risks and health risks. …”
Get full text
Get full text
Thesis -
2
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…For example, analyzing variables at different accident levels allows policymakers to identify critical factors contributing to accidents, implement tailored safety measures, and prioritize infrastructure improvements. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…RVSM focused on reducing vertical separation minimum from 2000 feet to 1000 feet between flight level FL290 and FL410. Implementation of RVSM stresses the accuracy of aircraft avionics that report altitude and requires the Regional Monitoring Agency (RMA) to monitor the aircraft's Height Keeping Performance (HKP) to ensure the aviation safety of their airspace. …”
Get full text
Get full text
Get full text
Thesis -
5
Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and...
Published 2007“…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. Multiple Signal Classification (MUSIC). …”
Get full text
Get full text
Thesis -
6
Hardware software partitioning of crankshaft function in engine control units using FPGA-based testing
Published 2017“…This project proposes hardware and software co-design that provides flexibility, timing precision, performance, manageable software design, complexity and meets safety requirement. The solution is aligned with Application-Specific Integrated Circuit (ASIC), which features complex control algorithm, implementation in hardware and controllable through firmware.…”
Get full text
Get full text
Conference or Workshop Item -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…Presently, VANET technology is surrounded with security challenges and it is essentially important for VANET to successfully implement a security measure according to the safety applications requirements. …”
Get full text
Get full text
Thesis -
9
Development of low-overhead soft error mitigation technique for safety critical neural networks applications
Published 2021“…DNN-based healthcare applications are safety-critical systems that require highreliability implementation due to a high risk of human death or injury in case of malfunction. …”
Get full text
Get full text
Thesis -
10
-
11
Seat belt control system : drowsiness detector system
Published 2022“…At the end, the developed system can be implemented in older models of vehicles to decrease the rate of accidents and fatalities in Malaysia, as well improve safety of the driver.…”
Get full text
Get full text
Undergraduates Project Papers -
12
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
13
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…L-TDMA shows a remarkable ability to conserve power in comparison to other protocols in different operating systems. Finally, the implementation of the developed embedded algorithms for strain-based applications resulted in a power consumption reduction of 77% compared to centralized processing.…”
Get full text
Get full text
Thesis -
14
-
15
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
Get full text
Get full text
Thesis -
16
Charging and discharging control of Li-Ion battery energy management for Electric vehicle application
Published 2023“…An intelligent charge control algorithm is used for this purpose. Backtracking search optimization algorithm (BSA) is implemented to optimize the parameters for generating regulated PWM signal. …”
Article -
17
Model-based hybrid variational level set method applied to object detection in grey scale images
Published 2024“…In industrial inspection, segmentation algorithms detect product defects, cracks, or anomalies for quality control and safety. …”
Get full text
Get full text
Thesis -
18
A hybrid algorithm of source localization based on hyperbolic technique in WSN
Published 2014“…Additionally, GA is implemented to acquire the globally best solution of localization parameters from non-linear equations set of ML solution. …”
Get full text
Get full text
Conference or Workshop Item -
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Artificial Intelligence Forecasting for Transmission Line Ampacity
Published 2023“…The capacity of the transmission system is usually capped at a certain level to comply with the safety and reliability conditions of the system. …”
Book Chapter
