Search Results - (( simulation activation detection algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- simulation activation »
- activation detection »
- java implementation »
- implementation path »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Web Camera Application For Motion Detection
Published 2003“…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
6
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
7
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023“…The system is modeled and simulated using MATLAB/Simulink simulation package with a shunt active power filter to compensate for the harmonics current injected by the loads. …”
Conference paper -
8
Broken Conductor Detection on Power Distribution Feeder
Published 2013“…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article -
9
Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms
Published 2024“…This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. …”
Article -
10
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Novel voice activity detection based on cepstrum moments
Published 2010“…Statistical methods for voice activity detection (VAD) have shown impressive performance especially with respect to their ability to be tuned parametrically and adoptability with deferent environments. …”
Get full text
Get full text
Conference or Workshop Item -
12
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
15
Combination of GREEN and SHRed AQM for short-lived traffic
Published 2008“…To evaluate the performance of new algorithm, network simulation has been done using NS-2 simulation.This study provides a series of NS-2 experiments to investigate the behavior of new algorithm.The results show improvement on short-lived traffic.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model
Published 2013“…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
Get full text
Get full text
Get full text
Article -
17
Botnet detection using automated script / Norfathin Rosli
Published 2020“…Nowadays, as we know the virus or malware spread can be so fast and usually hard to detect. This simulation is to detect the Botnet presence and identifying its behaviour. …”
Get full text
Get full text
Thesis -
18
Embedded wearable EEG seizure detection in ambulatory state
Published 2014“…The wearable devices allow the user to continue daily activities while being monitored for seizure activities. …”
Get full text
Get full text
Article -
19
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…The performance of the system is shown under various conditions of daily activities. In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
Get full text
Get full text
Conference or Workshop Item -
20
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…Various active attacks are implemented. A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
Get full text
Get full text
Get full text
Thesis
