Search Results - (( developing service sensor algorithm ) OR ( java data function algorithm ))
Search alternatives:
- developing service »
- function algorithm »
- sensor algorithm »
- service sensor »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
-
3
Development Of Motion Planer And Navigation System For An Office Assistant Robot
Published 2021“…Next, the localization of robot was based on the LiDAR sensor and rotary encoder with AMCL algorithm. In this research the global planners, A* and Dijkstra algorithm and local planners, DWA and TEB algorithms were implemented and tested on the robot in in simulation and a real environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Development of a wireless mesh network routing algorithm for oil and gas pipeline networks
Published 2021“…The purpose of this research is to develop an enhanced routing algorithm suitable for oil and gas pipeline application in the refinery area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Data transmission in wireless sensor network with greedy function and particle swarm optimization
Published 2019“…However, WSN conventional system namely Dırect Transmission (DT) protocol suffers high energy consumption, reducing the monitoring ability of the farmers due to the fast energy-depleting sensor nodes. Acknowledging this problem, researchers had developed many protocols such as Quality of Service (QoS), Low Energy Adaptive Clustering Hierarchy (LEACH), Location-based, and Power-Efficient Gathering in Sensor Information System (PEGASIS). …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
Predetermined path of mobile data gathering in wireless sensor networks based on network layout
Published 2014“…Extensive discrete-event simulations have been developed to assess the performance of the proposed algorithm. …”
Get full text
Get full text
Article -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…As it is challenging to implement security in resource-constrained IoT networks, the presented model adopted bioinspired approaches, offering an improved version of ACO towards secure data transmission cost-effectively while taking into consideration residual energy and the trust score of the sensor to be optimized. The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Multi-source data fusion framework for remote triaging and prioritization in telemedicine
Published 2015“…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
Get full text
Get full text
Thesis -
12
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
13
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
14
-
15
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Therefore, a new reference-free damage detection algorithm is proposed. The RWPE measurements of different sensor-to-sensor pairs are applied for defining the reference-free damage index (RDI) of each sensor location. …”
Get full text
Get full text
Get full text
Thesis -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Self-driving car with Artificial Intelligence (AI) technology / Asrul Amin Mohd Isa ... [et al.]
Published 2023“…It is based on the use of sensors, actuators, sophisticated algorithms, machine learning systems, and robust processors. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…Two algorithms, namely Artificial Potential Filed (APF) and Bug 2 are integrated into the model with an ultrasonic sensor to detect and avoid the obstacles. …”
Get full text
Get full text
Monograph
