Search Results - (( java application customization algorithm ) OR ( data collection within algorithm ))
Search alternatives:
- customization algorithm »
- collection within »
- java application »
- within algorithm »
-
1
Enhancing wireless sensor network data collection through aerial unmanned vehicles
Published 2024“…Integrating mobile collectors introduces the potential for energy conservation by shortening data routes. This article introduces three distinct algorithms for optimizing data collection in WSNs. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Predetermined path of mobile data gathering in wireless sensor networks based on network layout
Published 2014“…In addition, the proposed algorithm maintains the energy consumption within an acceptable level.…”
Get full text
Get full text
Article -
3
Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm
Published 2025“…The study adopted data from Qiao et al. (2020). The data contain a single depot, 47 waste collection points and 11 vehicles with maximum capacity of 80 tonnes. …”
Get full text
Get full text
Student Project -
4
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…The third proposed algorithm achieves an adaptive data gathering strategy. …”
Get full text
Get full text
Thesis -
5
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…The proposed OSA questionnaires have been newly designed after the data collection has been completed. The newly proposed and designed OSA questionnaires are customizable to best fit for Malaysians and have significant differences with the internationally standardized OSA questionnaires since these questionnaires are tailor-made based on the raw data collected within populations in Malaysia only. …”
Get full text
Get full text
Thesis -
6
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The use of multiple mobile sinks across the network for prompt data collection presents a challenge in cost-effective data management, especially in time-sensitive WSNs applications. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Performance of various forecasting algorithms to reduce the number of transmitted packets by sensor node in wireless sensor networks
Published 2018“…(AR-B), Autoregressive all-pole model parameters — Yule-Walker algorithm (AR-YW) and an Efficient Data Collection and Dissemination Algorithm (EDCD1). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Data discovery algorithm for scientific data grid environment
Published 2005“…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
Get full text
Get full text
Get full text
Article -
10
Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio...
Published 2018“…The data collected was subsequently simulated with the software driven algorithm (STAR protocol) and results were analysed to determine if it was better at maintaining blood glucose levels within set targets of 6-10 mmol/L. …”
Get full text
Get full text
Thesis -
11
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The developed system may open the door for automating the collection of machining data for all manufacturing processes…”
Get full text
Get full text
Thesis -
12
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
13
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…Firstly, data collected from available sources as Supervisory Control and Data Acquisition (SCADA). …”
Get full text
Get full text
Thesis -
14
-
15
Improved method of classification algorithms for crime prediction
Published 2014“…In this research classification is applied to crime dataset to predict the 'crime category' for diverse states of the United States of America (USA). The crime data set utilized within this research is real in nature, it was gathered from socio-economic data from 1990 US census. …”
Get full text
Get full text
Conference or Workshop Item -
16
Video image processing for traffic analysis
Published 1992“…The main aim was to develop a system for automatic vehicle data measurement and to extend its application to the collection and analysis of pedestrian data. …”
Get full text
Get full text
Get full text
Article -
17
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Finer garbage collection in LINDACAP.
Published 2010“…Multicapabilities in Lindacap enable tuples to be uniquely referenced, thus providing sufficient information on the usability of tuples (data) within the tuple-space. This paper describes the garbage collection mechanism deployed in Lindacap, which involves selectively garbage collecting tuples within tuple-spaces. …”
Get full text
Get full text
Article -
19
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
20
The application of queuing theory model and fuzzy queuing theory model using DSW algorithm to optimize vehicle flow at ferry terminal / Noratiqah Nasokha, Nurhamizah Salim and Nurs...
Published 2019“…Data were collected manually at Sultan Abdul Halim terminal is used and evaluated to determine arrival time and service time. …”
Get full text
Get full text
Student Project
