Search Results - (( code application service algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- application service »
- application sensor »
- service algorithm »
- code application »
- java application »
- sensor algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
A low complexity multi-layered space frequency coding detection algorithm for MIMO-OFDM
Published 2012Get full text
Get full text
Conference or Workshop Item -
3
Variable weight Khazani-Syed code using hybrid fixed-dynamic technique for optical code division multiple access system
Published 2016“…This paper proposes a coding algorithm to support optical domain service differentiation using spectral amplitude coding techniques within an optical code division multiple access (OCDMA) scenario. …”
Get full text
Get full text
Article -
4
Variable weight Khazani-Syed code using hybrid fixed-dynamic technique for optical code division multiple access system
Published 2016“…This paper proposes a coding algorithm to support optical domain service differentiation using spectral amplitude coding techniques within an optical code division multiple access (OCDMA) scenario. …”
Get full text
Get full text
Article -
5
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
6
-
7
-
8
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
9
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
10
The relationship of TFRC congestion control to video rate control optimization
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…The provision of resources and services for scientific workflow applications using a multi-cloud architecture and a pay-per-use rule has recently gained popularity within the cloud computing research domain. …”
Get full text
Get full text
Article -
12
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
HARQ aware scheduling algorithm for the downlink LTE system
Published 2011Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
15
-
16
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…The presence of XSS vulnerabilities in applications source codes enables XSS attacks to take place. …”
Get full text
Get full text
Thesis -
17
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
Get full text
Get full text
Get full text
Thesis -
18
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…This study applies machine learning techniques using the WEKA analytical tool to explore, cluster and classify servicing code applications using a dataset gathered from multiple faculties, and campuses within the Faculty of Business and Management in a selected public university in Malaysia. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article
