Search Results - (( using identification sensor algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- identification sensor »
- using identification »
- java implementation »
- sensor algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…The study proposes a multi-view ensemble algorithm to integrate predicted values of different motion sensors. …”
Get full text
Get full text
Article -
3
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…In addition, since smartphones are available to a wide group of people, a low-cost solution for human activity identification can be realized, without requiring the use of external sensors and circuitry.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
5
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
6
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
7
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
8
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
Get full text
Get full text
Thesis -
9
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
10
Development of auto-tracking mobile robot
Published 2018“…Moreover, two servo motors were used to control the pan-tilt movement of the vision sensor. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
12
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…The proposed approach in this study uses a depth sensor and employs a unique procedure which identifies the fall risk levels to adapt the algorithm for different people with their physical strength to withstand falls. …”
Get full text
Get full text
Get full text
Article -
13
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…The proposed approach in this study uses a depth sensor and employs a unique procedure which identifies the fall risk levels to adapt the algorithm for different people with their physical strength to withstand falls. …”
Get full text
Get full text
Get full text
Article -
14
Improvement of Auto-Tracking Mobile Robot based on HSI Color Model
Published 2018“…Moreover, two servo motors were used to control the pan-tilt movement of the vision sensor. …”
Get full text
Get full text
Get full text
Article -
15
Development of damage identification scheme using de-noised modal frequency response function data with artificial neural network / Mohamad Izzudin Hussein Shah
Published 2018“…Multilayer Perceptron (MLP) with backpropagation learning algorithm ANN is used in this study. Moreover, this study needs to minimize the number of samples used by reducing number of sensors and frequency range used without affecting the performance accuracy. …”
Get full text
Get full text
Thesis -
16
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
18
-
19
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…To verify the proposed model’s capability to build a self-calibration algorithm, the model was tested using an untrained input data set. …”
Get full text
Get full text
Get full text
Article -
20
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Therefore, a new reference-free damage detection algorithm is proposed. The RWPE measurements of different sensor-to-sensor pairs are applied for defining the reference-free damage index (RDI) of each sensor location. …”
Get full text
Get full text
Get full text
Thesis
