Search Results - (( java adaptation optimization algorithm ) OR ( things application using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Development of Image Recognition for Underwater Vehicle Applications by Syed Abdul Hamid , Syed Mohamad Shazali, Mohd Aras, Mohd Shahrieel, Ali, Fara Ashikin, Anuar , Mohamed Kassim, Abdul Azis, Fadilah

    Published 2011
    “…It is also expected to recognize biological underwater object to support on deck auto monitoring system. The developed algorithm will be used to recognize relevant underwater object or living thing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Internet of things (IoT) based grid tension monitoring system by Lina Khalida, Norazmi

    Published 2022
    “…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20