Search Results - (( development process end algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- application sensor »
- java application »
- sensor algorithm »
- end algorithm »
- process end »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…Stemming is a process of removing or transforming endings (suffixes) when they are found on a word; inflectional endings (-s, -ing, -ed, etc) and derivational endings (-ion, - ative, -ity, -ment, -less, etc) and prefixes (un-, in-, etc). …”
Get full text
Get full text
Final Year Project -
3
Optimization of micro-end milling process parameters of titanium alloy using non-dominated sorting genetic algorithm
Published 2013“…Finally, non-dominated sorting genetic algorithm-II as evolutionary optimization approach was used for multi-objective optimization of the micro-end milling process. …”
Get full text
Get full text
Thesis -
4
Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm
Published 2024“…End milling is one of the crucial processes to produce geometry shape products mainly in the automotive and aerospace industries. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
6
Artificial bee colony in optimizing process parameters of surface roughness in end milling and abrasive waterjet machining
Published 2012“…This research develops an optimization algorithm using artificial bee colony (ABC) algorithm to optimize the process parameters that will lead to minimum surface roughness (Ra) value for both end miling and abrasive waterjet machining. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. …”
Get full text
Get full text
Final Year Project -
8
Cutting temperature and surface roughness optimization in CNC end milling using multi objective genetic algorithm
Published 2012“…Machining of hard materials at high cutting speeds produces high temperatures in the cutting zone, which affects the surface quality. Thus, developing a model for estimating the cutting parameters and optimizing this model to minimize the cutting temperatures and surface roughness becomes utmost important to avoid any damage to the quality surface.This paper presents the development of new models and optimizing these models of machining parameters to minimize the cutting temperature in end milling process by integrating the genetic algorithm (GA) with the statistical approach. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…The developed algorithm control the mobile robot and resulted the mobile robot makes optimum logical trajectories towards the target, escape from the dead end traps by avoiding available obstacles and control the robot speed throughout the navigation process. …”
Get full text
Get full text
Thesis -
10
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The IDBA-AFW evaluates the fitness of relay nodes based on multiple criteria, such as energy efficiency, throughput, and end-to-end delay. Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
14
-
15
An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon
Published 1990“…In Section 3.0 we will propose a modification to the V-B algorithm. An analysis of the improved algorithm in comparison to te V-B algorithm is provided at the end of section 3.0.…”
Get full text
Get full text
Article -
16
Surface roughness optimization in end milling using the multi objective genetic algorithm approach
Published 2012“…This paper presents the optimization of machining parameters in end milling processes by integrating the genetic algorithm (GA) with the statistical approach. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Instruction Set Extension Of A Low-End Reconfigurable Microcontroller In Bit-Sorting Implementation
Published 2018“…It was found that the ISA extension from 12-bit to 16-bit has produced a faster execution time with fewer resource utilization when implementing the bit-sorting algorithm. The overall development process used in this research is flexible enough for further investigation either by extending its module to more complex algorithms or evaluating other designs of its components.…”
Get full text
Get full text
Get full text
Article -
18
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…In order to improve security, a proper algorithm should be implemented in the three-pass protocol by adding phases at starting and ending of the process. …”
Get full text
Get full text
Student Project -
19
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
Get full text
Get full text
Get full text
Thesis -
20
Weighted Watson-crick automata and applications in halal authentication
Published 2016Get full text
Get full text
Monograph
