Search Results - (( java _ implementation algorithm ) OR ( changes optimization sensor algorithm ))
Search alternatives:
- implementation algorithm »
- changes optimization »
- optimization sensor »
- sensor algorithm »
-
1
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022“…However, there is no existing gateway placement scheme that considers all the factors of number of gateways, sensor nodes coverage, lateral bound (inter-gateway) connections, redundancy for fault tolerance and dynamic changes of sensor nodes’ location. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Distributive and self-sustainable scheduling algorithm for wireless sensor networks
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
-
8
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The results obtained are then analysed to assess the proposed solution’s performance in obtaining each deployment objective’s optimal value. Finally, the proposed algorithm’s effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
9
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The results obtained are then analysed to assess the proposed solution's performance in obtaining each deployment objective's optimal value. Finally, the proposed algorithm's effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…Many advances have been made in terms of sensor technology for sensitivity optimization. Mostly available optical tactile sensors are bulky, inflexible and lack dexterity for applications with limited or space constraint. …”
Get full text
Get full text
Thesis -
12
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
13
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
14
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
Article -
15
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
16
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
17
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…This survey paper is focused on the discussion of best optimal path routing algorithms in wireless sensor networks by using supervised machine learning approaches. …”
Get full text
Get full text
Conference or Workshop Item -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
An Improved Distributed Scheduling Algorithm for Wireless Sensor Networks
Published 2012“…In contrast to earlier traditional scheduling algorithms of medium access control (MAC), which are generally designed for sequential slot assignments, this paper presents an improved algorithm for distributed scheduling. …”
Get full text
Get full text
Conference or Workshop Item -
20
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book
