Search Results - (( developing service sensor algorithm ) OR ( java a function algorithm ))
Search alternatives:
- developing service »
- function algorithm »
- sensor algorithm »
- service sensor »
- a function »
- java a »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
Development Of Motion Planer And Navigation System For An Office Assistant Robot
Published 2021“…Next, the localization of robot was based on the LiDAR sensor and rotary encoder with AMCL algorithm. In this research the global planners, A* and Dijkstra algorithm and local planners, DWA and TEB algorithms were implemented and tested on the robot in in simulation and a real environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Development of a wireless mesh network routing algorithm for oil and gas pipeline networks
Published 2021“…The purpose of this research is to develop an enhanced routing algorithm suitable for oil and gas pipeline application in the refinery area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Data transmission in wireless sensor network with greedy function and particle swarm optimization
Published 2019“…However, WSN conventional system namely Dırect Transmission (DT) protocol suffers high energy consumption, reducing the monitoring ability of the farmers due to the fast energy-depleting sensor nodes. Acknowledging this problem, researchers had developed many protocols such as Quality of Service (QoS), Low Energy Adaptive Clustering Hierarchy (LEACH), Location-based, and Power-Efficient Gathering in Sensor Information System (PEGASIS). …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Predetermined path of mobile data gathering in wireless sensor networks based on network layout
Published 2014“…Extensive discrete-event simulations have been developed to assess the performance of the proposed algorithm. …”
Get full text
Get full text
Article -
10
-
11
-
12
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…As a result, the objectives for this project are to study the most suitable algorithms used for a movie recommender system, to implement Collaborative Filtering algorithm on a movie recommender system prototype and to test the functionality of the movie recommender system, hi this project, a movie recommendation system with the use of Collaborative Filtering is proposed to produce a set list of movies for the users. …”
Get full text
Get full text
Thesis -
13
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…As it is challenging to implement security in resource-constrained IoT networks, the presented model adopted bioinspired approaches, offering an improved version of ACO towards secure data transmission cost-effectively while taking into consideration residual energy and the trust score of the sensor to be optimized. The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Songs Search Using Human Humming Voice
Published 2007“…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
15
Multi-source data fusion framework for remote triaging and prioritization in telemedicine
Published 2015“…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
Get full text
Get full text
Thesis -
16
Visdom: Smart guide robot for visually impaired people
Published 2025“…Key features include the SMAC Hybrid A* algorithm for global path planning, the Regulated Pure Pursuit Controller for local trajectory execution and dynamic obstacle avoidance, and gmapping for SLAM functionality. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Therefore, a new reference-free damage detection algorithm is proposed. The RWPE measurements of different sensor-to-sensor pairs are applied for defining the reference-free damage index (RDI) of each sensor location. …”
Get full text
Get full text
Get full text
Thesis -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
