Search Results - (( data evaluation sensor algorithm ) OR ( java _ implementation algorithm ))
Search alternatives:
- implementation algorithm »
- evaluation sensor »
- sensor algorithm »
- data evaluation »
-
1
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The performance metrics studied are the energy dissipation, execution time, and size of encryption data. The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster
Published 2018“…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
6
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
7
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
8
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
An efficient real-time data collection model for multivariate sensors in internet of things (IOT) applications
Published 2019“…This work provides an extensive analysis for the design and performance evaluation of real-time data collection model for multivariate sensors in IoT applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…Our evaluation suggests that the proposed algorithm can be approximately 39.9% more efficient than its counterparts for various data sets in terms of computational time.…”
Get full text
Get full text
Article -
13
Metaheuristic multi-hop clustering optimization for energy-efficient wireless sensor network
Published 2020“…On the other hand, multi-hop optimization algorithm will form a multi-hop network by transmitting data to base station (BS) through data multi-hopping between sensor nodes. …”
Get full text
Get full text
Article -
14
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
16
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…The performance evaluation of the proposed data gathering algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
Get full text
Get full text
Thesis -
17
Satellite attitude determination utilizing measurement sensor data and kalman filtering
Published 2006“…This algorithm utilizes the three axis rate gyros for the satellite angular rate data and star camera line-of-sight measurements. …”
Get full text
Get full text
Article -
18
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…We evaluated the performance of augmenting the 3D object using the techniques, vision-based, and incorporating the sensor data using the video data. …”
Get full text
Get full text
Get full text
Article -
19
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…These factors necessitate the creation of an energy-efficient routing algorithm to minimize energy consumption and extend sensor lifetimes. …”
Get full text
Get full text
Get full text
Thesis -
20
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis
