Search Results - (( variable _ ((users algorithm) OR (sensor algorithm)) ) OR ( java application using algorithm ))
Search alternatives:
- sensor algorithm »
- java application »
- users algorithm »
- using algorithm »
- variable »
-
1
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
2
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
3
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…In this algorithm, the user has to tune an appropriate variable which directly affects the power consumption and the data gathering latency. …”
Get full text
Get full text
Thesis -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
5
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…Then, the data is cluster by using K Means to produce labeled input that will be trained by using Gradient Boosting Machine, a decision tree algorithm to make prediction. The columns consist of the variables that record the reading of machine sensor tags. …”
Get full text
Get full text
Final Year Project -
6
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
7
Self-calibration algorithm for a pressure sensor with a real-time approach based on an artificial neural network
Published 2018“…The self-calibration algorithm should be able to fix major problems in the pressure sensor such as hysteresis, variation in gain and lack of linearity with high accuracy. …”
Get full text
Get full text
Get full text
Article -
8
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This study investigates the use of a novel Proposed Self-Calibration Algorithm (PSCA) of multi pressure sensors in real time on robotic hand glove system. …”
Get full text
Get full text
Thesis -
9
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…These include exploring recognition of gestures performed by two hands simultaneously, scalability to different environments, optimal sensor placement, and addressing user variability. …”
Get full text
Get full text
Get full text
Thesis -
10
Integrated multi sensors and camera video sequence application for performance monitoring in archery
Published 2018“…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
Get full text
Get full text
Conference or Workshop Item -
11
Integrated multi sensors and camera video sequence application for performance monitoring in archery
Published 2018“…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
Get full text
Get full text
Conference or Workshop Item -
12
An enhanced fingerprint template protection scheme
Published 2022“…Fingerprint template protection (FTP) is required to secure authentication due to fingerprint has been widely used for user authentication systems. Fingerprint authentication consists of a microcontroller, fingerprint sensor, secure access control, and human interface. …”
Get full text
Get full text
Thesis -
13
Integrated multi sensors and camera video sequence application for performance monitoring in archery
Published 2017“…The three camera views with the five body sensors are integrated into a single computer application which enables the user to view all the data in a single user interface. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…The results indicated that good classification performance depends on these factors. All algorithms showed more stability and accuracy when training size applied is more than 6% by the Equal Sample Rate (ESR) method with six variables. …”
Get full text
Get full text
Thesis -
15
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
16
-
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network
Published 2013“…In this paper, fuzzy logic and chaotic based genetic algorithms are combined to extend the lifetime of sensor nodes. …”
Get full text
Get full text
Article -
19
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory
Published 2015“…Finally, the algorithm to obtain a general FTCS framework is developed to provide compensation of the sensor faults through the introduction of a new control law unto the existing nominal one. …”
Get full text
Get full text
Get full text
Thesis
