Search Results - (( developing sensor scheduling algorithm ) OR ( java applications testing algorithm ))
Search alternatives:
- applications testing »
- developing sensor »
- sensor scheduling »
- java applications »
- testing algorithm »
-
1
Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan
Published 2022“…Several routing protocols have been developed and proposed in the literature for the development of energy-efficient routing strategies of Wireless Sensor Networks. …”
Get full text
Get full text
Thesis -
2
-
3
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
Get full text
Get full text
Get full text
Thesis -
4
Advanced differential interferometry synthetic aperture radar techniques for deformation monitoring: a review on sensors and recent research development
Published 2014“…Also, current issues in sensor and algorithm development are discussed. The study identified six existing A-DInSAR algorithms used for monitoring various deformation types. …”
Get full text
Get full text
Article -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
Get full text
Get full text
Thesis -
8
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…By using a task scheduling and offloading method, the FOCS algorithm arranges data according to size and sends it to the appropriate fog nodes. …”
Get full text
Get full text
Get full text
Thesis -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
10
-
11
-
12
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…Third, a relational database is developed to store the information from the simulation. …”
Get full text
Get full text
Monograph -
13
-
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Single fitness function analysis of energy-consumption and radio bandwidth management in coverage area problems
Published 2024thesis::master thesis -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Finally, the implementation of the developed embedded algorithms for strain-based applications resulted in a power consumption reduction of 77% compared to centralized processing.…”
Get full text
Get full text
Thesis -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
