Search Results - (( developing function sensor algorithm ) OR ( java generation process algorithm ))
Search alternatives:
- developing function »
- generation process »
- process algorithm »
- sensor algorithm »
- java generation »
-
1
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
3
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
6
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…A surface exploration computer algorithm to obtain the sensing information was developed in order to analyse the characteristic of the optical tactile sensor. …”
Get full text
Get full text
Thesis -
7
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…Fuzzy modeling is a process of generating parameters which are fuzzy rule and membership function. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…To reduce the test cases generated during testing process, combinatorial algorithms which consisting Hill Climbing algorithm and T Way Combination algorithm as described in twayGenerator (Kamal Zuhairi Zamli, 2007) have been studied and reviewed. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
Get full text
Get full text
Article -
10
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…This research aims to develop an effective and high-performance multi-sensor correlation algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Java based expert system for selection of natural fibre composite materials
Published 2013“…Many research papers are published in the field of materials selection for manufacturing process and design of polymer composite materials. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…These approaches of clustering algorithms whether Distributed, Centralized, or Hybrid are reviewed very well, since the most of clustering algorithms have been developed by many researches based on these approaches. …”
Get full text
Get full text
Get full text
Article -
14
Line follower balbot
Published 2010“…This project focuses on the development of a line follower algorithm for a Balbot. …”
Get full text
Get full text
Undergraduates Project Papers -
15
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…Particle Swarm Optimization has been used in the proposed algorithm to minimize the fitness function. Voronoi diagram has also used in order to ensure that the mobile sensors cover the whole sensing field. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. …”
Get full text
Get full text
Conference or Workshop Item -
17
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
Efficient terrain coverage for deploying wireless sensor nodes on multi-robot system
Published 2016“…Developing an exploration algorithm based on spanning tree is the main contribution and this exploration algorithm is performing fast localization of sensor nodes in energy efficient manner. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The website tested by many users that use to register and upload them own data and files using them own e-mails and the unique key that generated after completing the registration. We used to insure for the users data and files in our website by checking the process of our generated system (SCDS) and we got match results for the same files in case of encryption and decryption process.…”
Get full text
Get full text
Get full text
Get full text
Thesis
