Search Results - (( variable detection device algorithm ) OR ( java application service algorithm ))
Search alternatives:
- application service »
- variable detection »
- service algorithm »
- device algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Wind Turbines: Novel Control Algorithm in Region II
Published 2014Get full text
Get full text
Get full text
Get full text
Article -
4
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…The performance of the algorithm achieved a sensitivity of 100% for QRS onset detection and 100% for T offset detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Faulty sensor detection mechanism using multi-variate sensors in IoT
Published 2019“…Thus, it is very important to manage these IoT devices efficiency. Traditional ways in the management of IoT devices, require a maintenance officer to check each device every day. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
7
Enhancing safety of micro-mobility and powered mobility devices using YOLOv12-based real-time obstacle detection
Published 2025“…Future work will address lighting variability and braking integration.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection
Published 2018“…To achieve the ability of in-situ processing of detection, embedded algorithms like digital FIR filter, multiple peaks finding, peaks classification and linear regressions have been implemented on an ARM processor. …”
Get full text
Get full text
Thesis -
9
Advanced fault detection in DC microgrid system using reinforcement learning
Published 2021“…The results showed that the improved Negative Selection Algorithm with variable sized detector has better performance than the general Negative Selection Algorithm with constant sized radius in detecting fault in DC microgrid system.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
10
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019“…The main objective for this study is to analyse the harmonics components in AC power system using Fast Fourier Transforms (FFT) algorithm. Other than that, the objective is also to design and develop the harmonic detection system for power quality of AC power system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
14
-
15
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…The proposed methods can be implemented for accurate monitoring and early detection of activity details using wide range of sensors in mobile and wearable devices. …”
Get full text
Get full text
Get full text
Thesis -
16
A peer-to-peer blockchain based interconnected power system
Published 2021“…Harmonics is a power efficiency/quality variable caused by electronic devices that domestic and industrial consumers use. …”
Get full text
Get full text
Get full text
Article -
17
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004Get full text
Get full text
Thesis -
18
Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW
Published 1996“…For monitoring of workpiece thickness variations, an ultrasonic device was used. In order to accurately control the weld trajectory, a CCD camera was used. …”
Get full text
Get full text
Thesis -
19
Estimation of non-contact smartphone video-based vital sign monitoring using filtering and standard color conversion techniques
Published 2018“…The Inter beat interval (IBI) based on maximum peak detection approach has been used for heart rate variability estimation. …”
Get full text
Get full text
Article -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
