Search Results - (( developing small protocols algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
    Article
  3. 3

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2016
    “…This paper focuses on developing a proactive multi-copy routing protocol with carry and forward mechanism that is able to deliver packets from a source vehicle to a destination vehicle at a small delivery delay. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2015
    “…This paper focuses on developing a proactive multi-copy routing protocol with carry and forward mechanism that is able to deliver packets from a source vehicle to a destination vehicle at a small delivery delay. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…The performance evaluations proved that a small-scale yet robust ML-IDS algorithm is successfully developed to classify traffic and blocking attack traffic, while proposed ML-RA successfully offer better delay and throughput performance than the RIPv2 routing protocol.…”
    text::Thesis
  9. 9

    Relay suitability based routing protocol for video streaming in vehicular ad-hoc network by Omar Abdulmaged, Hammood

    Published 2022
    “…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Position-based multicast routing in mobile ad hoc networks: an analytical study by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2012
    “…Most of the existing QoS multicast routing protocols are designed with flat topology and small networks in mind. …”
    Get full text
    Get full text
    Article
  11. 11

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment by Zarrin, Javad

    Published 2009
    “…In this research a new mechanism and algorithm is designed to improve current wireless service discovery protocols. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Plug and play innosat ACS simulator by Siti Maryam, Sharun, Mohd Yusoff, Mashor, Fadzilah, Hashim

    Published 2015
    “…The MSE values that have been calculated also show that there are a close match between HILS and MATLAB simulation where the MSEs different value are small. From both results, it is enough to verify that the developed protocol working satisfyingly and seems to be possible to be implemented on the actual flight.…”
    Get full text
    Get full text
    Article
  16. 16

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Collision probability of one-to-many reversible mapping for IPV6 address generation by Nashrul Hakiem, Nashrul Hakiem, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito Wigati

    Published 2012
    “…The results show that the collision probability is very small indeed. The one-to-many reversible mechanism may be incorporated as an extension to the current DHCPv6 software.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    A numerical model to analyze handoff delay and packet loss in PNEMO environment by Islam, Shayla, Hassan Abdalla Hashim, Aisha, Razzaque, Abdur, Hasan, Muhammad Kamrul

    Published 2018
    “…Moreover, the wireless nodes are usually small and therefore resource-constrained. Thus, it is not possible to use algorithms having large processing power or memory footprint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    A Numerical Model to Analyze Handoff Delay and Packet Loss in PNEMO Environment by Shayla, Islam, Aisha, Hassan Abdalla Hashim, Abdur, Razzaque, Mohammad Kamrul, Hasan

    Published 2018
    “…Moreover, the wireless nodes are usually small and therefore resource-constrained. Thus, it is not possible to use algorithms having large processing power or memory footprint. …”
    Get full text
    Get full text
    Get full text
    Proceeding