Search Results - (( structures detection system algorithm ) OR ( java application tools algorithm ))
Search alternatives:
- structures detection »
- application tools »
- system algorithm »
- java application »
- tools algorithm »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
-
3
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…Additionally, the space-time receiver structure is combined with multiuser detection to further enhance the system. …”
Get full text
Get full text
Thesis -
6
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
-
11
A study of progressive damage detection in thin-walled composite structures using an embedded fiber Bragg grating – acoustic emission hybrid system
Published 2019“…The algorithm was named as cross-correlation with linear source location technique (CC-LSL) impact detection algorithm.…”
Get full text
Get full text
Research Report -
12
Biometric recognition system for UiTM Melaka Student’s Campus entrance / Khairul Rohaizzat Jamaluddin
Published 2017“…The system utilized a combination of algorithms such as the Viola-Jones algorithm and SURF for facial structures and features detection. …”
Get full text
Get full text
Student Project -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
14
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
15
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Model structure selection is one of the important steps in a system identification process. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
19
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
Get full text
Get full text
Student Project -
20
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. …”
Conference Paper
