Search Results - (( developing constructing computational algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- constructing computational »
- application sensor »
- java application »
- sensor algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Ball surface representations using partial differential equations
Published 2015“…Two specific Ball surfaces, namely harmonic and biharmonic, are first constructed in developing the proposed algorithm. The former and later surfaces require two and four boundary conditions respectively. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
5
The Anglerfish algorithm: a derivation of randomized incremental construction technique for solving the traveling salesman problem
Published 2019“…Smart algorithms have been developed to address this issue. …”
Get full text
Get full text
Article -
6
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
7
Developing an algorithm for triad design
Published 2012Get full text
Get full text
Get full text
Article -
8
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
9
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
10
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. These algorithms are formulated for computing Tate and ate pairing. …”
Get full text
Get full text
Thesis -
11
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…IoT study fields currently involve security and privacy due to the fact that the installation of Cryptographic Internet Communications "ICs" for protected IC applications like Fog Computing and Cloud Computing devices is extremely crucial in any developing technology. …”
Get full text
Get full text
Get full text
Thesis -
12
Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai
Published 2021Get full text
Get full text
Thesis -
13
-
14
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
16
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
17
Parameter estimation of cocomo model using the jaya algorithm for software cost estimation
Published 2019“…The Constructive Cost Model (COCOMO) is a procedural software cost estimation model developed by Barry W. …”
Get full text
Get full text
Undergraduates Project Papers -
18
-
19
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
20
