Search Results - (( developing information during algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    A simulation software for DNA computing algorithms implementation by Muhammad, M.S., Masra, S.M.W., Kipli, K., Zamhari, N.

    Published 2010
    “…This simulation software capability is unlimited where problem of any size and complexity can be simulated, thus saving cost due to possible errors during the design process. Information regarding the DNA sequence during the computing process as well as the computing output…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…Vaishnavi and Kuechler Methodology has been implemented in various applications and it considered as a general methodology to develop totally new algorithms and create new information according to the accumulated information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  9. 9

    Fetal R-Wave detection in the ambulatory monitoring of maternal abdominal signal by Mohd Alauddin Mohd Ali, Crowe, J.A., Hayes-Gill, B.R.

    Published 1995
    “…An algorithm for the real-time measurement of the fetal and maternal RR intervals from a single-lead abdominal signal has been developed on a low power TMS32010 digital signal processor development system. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM by Carey, Ling Yu Fan

    Published 2023
    “…The resulting mapper graphs reveal the pandemic’s development progress across time and place during year 2021. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12
  13. 13

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
    Get full text
    Get full text
    Article
  14. 14

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
    Get full text
    Get full text
    Article
  15. 15

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  16. 16

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…The email system used to send the encrypted file to the third party. During the development of COS, the specific methodology used which is Prototyping Process. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Development of intrusion detection system using residual feedforward neural network algorithm by Rustam, Rushendra, Ramli, Kalamullah, Hayati, Nur, Ihsanto, Eko, Gunawan, Teddy Surya, Halbouni, Asmaa Hani

    Published 2022
    “…An intrusion detection system (IDS) is required to protect data from security threats that infiltrate unwanted information via a regular channel, both during storage and transmission. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…This requires time consuming and lots of information may be lost during the processes. Thus, Maio and Maltoni (1997) proposed a method to detect minutiae in gray scale fingerprint images based on ridge line following algorithm, which is to trail the ridge line according to the fingerprint directional image. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah by Wan Ngah, Wan Ahmad Jailani

    Published 2013
    “…PointsBug also avoids the necessity to store any information about previous positions of navigation such as hit point, leaving point and previous position in Bug algorithms family developed by past researches. …”
    Get full text
    Get full text
    Thesis