Search Results - (( iot implementation software algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation software »
- implementation learning »
- java implementation »
- iot implementation »
- software algorithm »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
IOT BASED CAR PARKING MANAGEMENT SYSTEM USING CAR PLATE RECOGNITION
Published 2019Get full text
Get full text
Final Year Project Report / IMRAD -
5
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The blockchain structure requires a consensus algorithm that is lightweight, efficient and meets the computational limitations of the IoT devices. …”
Get full text
Get full text
Thesis -
6
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
9
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The second element, implementation of IoT is with the purpose of collecting surveillance data. …”
Get full text
Get full text
Monograph -
10
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…These features resulted in faster runtime compared to the more established RS A asymmetric encryption scheme, making AAp a potential alternative for IoT security. At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
11
Lightweight cryptographic hash functions: design trends, comparative study, and future directions
Published 2022“…Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Wireless IoT smart door lock using Viola-Jones face detection technique / Samsiah Ahmad...[et al.]
Published 2020“…The fundamental system design, implementation of hardware and software as well as the data collection and processing techniques are described in this paper. …”
Get full text
Get full text
Get full text
Article -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
15
Bundle Sorting Mobile Application
Published 2020“…The focus in the apparel industry is to ensure all the processes in the production line get the identical garments without any redundancy of the output process. By implementing the Internet of Thing (IoT) in the apparel industry, it will increase the efficiency of the garment’s quantity output process per day. …”
Get full text
Get full text
Final Year Project -
16
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…To secure these critical infrastructures, security measures should be examined and implemented. These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
17
Face reidentification system to track factory visitors using OpenVINO
Published 2020“…Fortunately, developer may abstract away this difficulty by implement OpenVINO onto IoT devices and make it use CPU to inference on real time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Energy efficient routing protocols for wireless sensor networks: Comparison and future directions
Published 2017Get full text
Get full text
Conference or Workshop Item
