Search Results - (( developing bring function algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- function algorithm »
- application sensor »
- developing bring »
- java application »
- sensor algorithm »
- bring function »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
3
Development of a scalable video compression algorithm
Published 2012“…The choice of a scalable video coding framework in this context brings technical and economical advantages. The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Design and development of an intelligent battery charger station
Published 2009“…The fast charge cycle bring the battery to approximately 90% of the full charge condition. …”
Get full text
Get full text
Monograph -
5
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Application of Bee Colony Optimization (BCO) in NP-Hard Problems
Published 2011“…Bee-Inspired algorithms were presumed to bring the new direction in the field of Swann Intelligence. …”
Get full text
Get full text
Final Year Project -
7
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…This thesis introduces an innovative signal detector algorithm in facilitating the cognitive radio functionality for the new IEEE 802.22 Wireless Regional Area Networks (WRAN) standard. …”
Get full text
Get full text
Get full text
Thesis -
8
Modelling of multi-robot system for search and rescue
Published 2023“…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…The project achieve objectives by using RAD (Rapid Application Development) approach as the guideline and by making sure that this application is filled with great user experiences and functionality goals. …”
Get full text
Get full text
Thesis -
10
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The separation of control functionality from forwarding devices brings orchestration and management to enable 5G network programmability. …”
Get full text
Get full text
Thesis -
11
Scentopia: Navigating the World of Fragrance
Published 2024“…This research presents a comparative analysis that emphasises the unique qualities of Scentopia above other platforms in the market, highlighting its large database size, sophisticated recommendation algorithm, and high degree of personalisation. The research also looks into potential future projects, such as adding a visual search function, bringing the application to Android and other platforms, allowing for ongoing user feedback, and doing routine maintenance and updates. …”
Get full text
Get full text
Final Year Project -
12
Internet access using encrypted membercard / Muhammad Syafiq Sopian
Published 2021“…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. …”
Get full text
Get full text
Student Project -
13
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Android Ransomware Detection Based on Dynamic Obtained Features
Published 2024journal::journal article -
15
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…Due to its significant function, whereby a conversion of manual procedure into a web based module is necessary, this module will be effective and brings benefits to the authorities, Halal logistic service providers and also users.…”
Get full text
Get full text
Thesis -
16
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
17
Critical insight for MAPReduce optimization in Hadoop
Published 2014“…The predominant philosophy behind Hadoop optimization is the optimization of MapReduce, which is a dominant programming platform effective in bringing a=bout many functional enhancements as per scheduling algorithms developed and implemented. …”
Get full text
Get full text
Get full text
Article -
18
The behavior of MENA oil and non-oil producing countries in international portfolio optimization
Published 2010“…It is well documented in developed economies that portfolio investment across national borders brings benefits of increasing returns and/or reducing risk. …”
Get full text
Get full text
Article -
19
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. …”
Get full text
Get full text
Article -
20
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. …”
Get full text
Get full text
Thesis
