Search Results - (( based instruction sensor algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- instruction sensor »
- sensor algorithm »
- java application »
-
1
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Second, an improved steganographic algorithm based on the infamous Least Significant Bit (LSB) is proposed for hiding the sensed data scheduled for transmission. …”
Get full text
Get full text
Get full text
Thesis -
2
Tracking moving targets in wireless sensor networks using extended diffusion strategies of distributed Kalman filter
Published 2013“…The proposed algorithms provide precise state estimates in a moment as global state estimates using various updates at each step. …”
Get full text
Get full text
Conference or Workshop Item -
3
Smart and energy aware routing for the internet of mobile things
Published 2021“…This can also be concluded that the SEA routing algorithm is smart and energy aware based on the results obtained.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…Kalman filter recognized data from the system sensors and can indicate the fault of the system in the sensor reading. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…This study aims to address the need for improved firefighting systems in academic building by proposing the development of an IoT-based automated emergency response website. The proposed system leverages IoT technology, wireless and bluetooth sensor networks to gather real-time data from various sensors and devices installed in the site and uses machine learning algorithms to predict and prevent potential fire incidents. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT
Published 2025“…Users are guided with AR-based path visualisation, distance indicators, and voice instructions, ensuring intuitive and efficient navigation across multiple floors. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
