Search Results - (( based detection sensor algorithm ) OR ( java implementation a algorithm ))
Search alternatives:
- java implementation »
- detection sensor »
- sensor algorithm »
- implementation a »
- based detection »
- a algorithm »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…A prototype of a mobile robot based on Lego successfully implemented by using PIC and can be controlled through voice recognition. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
4
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…In addition, the study suggests a promising potential of hybrid feature selection approach, diversity-based multiple classifier systems to improve mobile and wearable sensor-based human activity detection and health monitoring system. © 2019, The Author(s).…”
Get full text
Get full text
Article -
5
Square groove detection based on forstner with canny edge operator using laser vision sensor
Published 2023“…Therefore, 1he acquired detection results are sufficiently accurate, demonstrating 1he rationale of1he suggested visual sensor's physical design and 1he validity of 1he proposed detection algorithms.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…There are various approaches used to classify human activities for fall detection. Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
Get full text
Get full text
Get full text
Article -
7
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…There are various approaches used to classify human activities for fall detection. Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
Get full text
Get full text
Get full text
Article -
8
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
9
WSN based intruder detection system based on Territorial Predator Scent Marking Algorithm (TPSMA) sensor node placement scheme
Published 2023Conference Paper -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
Get full text
Get full text
Get full text
Article -
12
Landmark detection for vision based of autonomous guided vehicle
Published 2012“…The landmarks must be detected and recognized by vision sensor accurately in a real-time. …”
Get full text
Get full text
Undergraduates Project Papers -
13
-
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
15
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
16
Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network
Published 2013“…In this paper, fuzzy logic and chaotic based genetic algorithms are combined to extend the lifetime of sensor nodes. …”
Get full text
Get full text
Article -
17
A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network
Published 2016“…In this thesis, a Reinforcement Learning (RL) based clustering algorithm is proposed to address energy and Primary Users (PUs) detection challenges in CR-WSN. …”
Get full text
Get full text
Thesis -
18
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
19
A review: radar-based fall detection sensor / Hidayatusherlina Razali ... [et al.]
Published 2024“…Radar-based sensors can accurately capture Doppler frequency variations from human motion by utilising time-frequency representations and classification algorithms. …”
Get full text
Get full text
Article -
20
Object detection technique for small unmanned aerial vehicle
Published 2017“…However, each of the sensor has its own advantage and disadvantage, thus we built the obstacle detection and avoidance system based multi sensor (monocular sensor and LIDAR) integration. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
