Search Results - (( iot implementation best algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- implementation best »
- iot implementation »
- data visualization »
- best algorithm »
- java »
-
1
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
Get full text
Get full text
Thesis -
2
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…IoT is considered a widely recognized implementation that includes intelligent health care, intelligent transport, and intelligent grids. …”
Get full text
Get full text
Article -
3
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
4
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
5
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
6
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…Random Forest algorithm be used in this study which is got the best performance with 83% accuracy then the other algorithms in WEKA. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
8
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Article -
9
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Thesis -
10
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The second element, implementation of IoT is with the purpose of collecting surveillance data. …”
Get full text
Get full text
Monograph -
11
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
15
Face reidentification system to track factory visitors using OpenVINO
Published 2020“…Fortunately, developer may abstract away this difficulty by implement OpenVINO onto IoT devices and make it use CPU to inference on real time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article
