Search Results - (( java application sensor algorithm ) OR ( management implementation real algorithm ))
Search alternatives:
- implementation real »
- application sensor »
- java application »
- sensor algorithm »
- real algorithm »
-
1
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…Most of the current studies in image processing are not reliable for real implementation because they either lack accuracy or do not work in real time. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
3
Optimal vehicle to grid planning and scheduling using double layer multi-objective algorithm
Published 2023“…Algorithms; Charging (batteries); Curve fitting; Electric load flow; Electric power systems; Electric vehicles; Energy management systems; Optimization; Reactive power; Real time control; Scheduling; Vehicles; Voltage control; Voltage regulators; Battery chargers; Bidirectional power flow; Multi objective algorithm; Optimization algorithms; Reactive power compensation; Real-time implementations; Revolutionary technology; Vehicle to grids; Electric power transmission networks; algorithm; electric vehicle; electricity supply; energy flow; energy planning; energy use; optimization; technological development…”
Article -
4
DC motor control using LQR algorithm
Published 2008“…An application in Matlab called Simulink is used as tools for algorithm implementation. Simulink is chosen due to its block diagram implementation and its creation of user interface which allowing interfacing with programs in others languages. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment
Published 2023“…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm
Published 2025“…The implementation of ABC algorithm consists of four phases which are initialisation, employed, onlooker and scout bee phases. …”
Get full text
Get full text
Student Project -
7
Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms
Published 2025“…This research contributes to the advancement of battery management technology, offering promising implications for electric vehicle energy management and broader energy storage applications.…”
Get full text
Get full text
Get full text
Article -
8
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
9
Traffic management algorithms for LEO satellite networks
Published 2016“…Overall, from all the three experiments that have been conducted, the proposed routing algorithms which have been developed to manage the network traffic have proved better than the previously developed algorithms in several perspectives especially for the implementation of real-time applications in LEO satellite networks.…”
Get full text
Get full text
Get full text
Thesis -
10
-
11
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…In order to demonstrate the feasibility of the algorithm, the engine was tested in the real application of football team management. …”
Get full text
Get full text
Get full text
Thesis -
12
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Quality of Services for bandwidth management is a crucial task in computer network. Policing and Shaping algorithms are identified as one of the task in bandwidth control, especially in tele-traffic engineering and computer network. …”
Get full text
Get full text
Article -
14
A new fair marker algorithm for DiffServ networks
Published 2008Get full text
Get full text
Article -
15
Comparative study of apriori-variant algorithms
Published 2016“…One of data mining methods is frequent itemset mining that has been implemented in real world applications, such as identifying buying patterns in grocery and online customers’ behavior.Apriori is a classical algorithm in frequent itemset mining, that able to discover large number or itemset with a certain threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Quality of Services for bandwidth management is a crucial task in computer network. Policing and Shaping algorithms are identified as one of the task in bandwidth control, especially in tele-traffic engineering and computer network. …”
Get full text
Get full text
Thesis -
17
Real-Time Object Detection System for Hospital Assets Using YOLOv8
Published 2024“…Based on this problem, the author hopes to solve it by implementing real-time object detection and recording data distribution using the YOLO (You Only Look Once) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali
Published 2016“…The RBP algorithm has two layers, upper and lower. The upper layer of the RBP exploits the LTE frame concept that contains a number of sub-frames, whereas the lower layer of the RBP algorithm adopts the concept of a Proportional Fair (PF) algorithm to schedule the non-real time (NRT) flows, while an Exponential/Earliest Deadline (Exp/ED) algorithm is applied for the real time (RT) flows. …”
Get full text
Get full text
Thesis -
19
-
20
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The main components of cryptography are the algorithm and the key management. However, an adversary could use coercion method where both components can no longer be reliable. …”
Get full text
Get full text
Thesis
