Search Results - (( java application customization algorithm ) OR ( data reduction connection algorithm ))

Refine Results
  1. 1

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
    Article
  2. 2

    Classification of basal stem rot disease in oil palm using dielectric spectroscopy by Al-Khaled, Al-Fadhl Yahya Khaled

    Published 2018
    “…An analysis was done to see the effect of implementing different data reduction algorithms in classifying BSR disease. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…The proposed algorithms achieved minimized data reduction ratio, number of deployed tasks, energy consumption, delay; and in addition, increased throughput, and better resource utilization, which in all enhanced the overall network quality of service. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…On top of that, the existing analysis tools and algorithms did not consider the data generated by sensory devices connected to the Internet. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    The evolution and trend of chain code scheme by Wulandhari, Lily Ayu, Haron, Habibollah

    Published 2008
    “…Chain code is widely used nowadays because it preserves information and allows considerable data reduction. The first approach for representing digital curves using chain code was introduced by Freeman in 1961, and it is known as Freeman Chain Code (FCC). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…The benefits of this system include reduction of shrinkage and data transfer time in global network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks by Hussein, Yassein Soubhi

    Published 2014
    “…In HOPP, the results demonstrate that the reduction of HOPP ratio by the FuzAMP algorithm relative to that of the conventional HHO algorithm is approximately 54%, 44%, and 69% at 3, 30, and 120 km/h, respectively, and over EWPHPO algorithm the improvement is approximately 38%, 33%, and 65%, respectively. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi by Hosseiny Fatemi, Mohammad Reza

    Published 2012
    “…For the hardware architecture design, we choose bit-serial structure for implementing our algorithm to benefit from its advantages. Moreover, we use SAD truncation, reusability, source sharing, and power saving techniques in our architecture, which lead to area saving and power consumption reduction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Handover algorithm with joint processing technique based on coordinated multipoint (COMP) transmission and reception in LTE-advanced heterogeneous network / Muhammad Aiman Zainali by Zainali, Muhammad Aiman

    Published 2020
    “…The JP technique based on CoMP handover algorithm has been proposed and the simulation results show a significant reduction in number of handover calls rate up to 68% when compared to other handover algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications by Rafique, Majid

    Published 2025
    “…By using a task scheduling and offloading method, the FOCS algorithm arranges data according to size and sends it to the appropriate fog nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems by Mubarak, Sinil, Habaebi, Mohamed Hadi, Abdul Rahman, Farah Diyana, Khan, Sheroz, Islam, Md Rafiqul

    Published 2019
    “…Supervisory control and data acquisition (SCADA) system is a computer based system implemented to control the physical processes which enhances the operational efficiency, cost reduction and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…These approaches have demonstrated improvements in packet delivery ratios (PDRs), latency reduction, and energy efficiency within mobile IoT contexts. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Finally, focus is given to the routing cost reduction through the incorporation of Dominant Pruning (DP) as assisting factor that works together with the constructed Connected Dominating Set (CDS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Hybrid PV and battery system sizing for commercial buildings in Malaysia a case study of FKE-2 building in UTeM by Hossain, Jahangir, Abdul Kadir, Aida Fazliana, Shareef, Hussain, Hossain, Md. Alamgir

    Published 2023
    “…To achieve this, a rule-based energy management system with peak-shaving is implemented using the particle swarm optimization algorithm. The optimization process takes into account actual annual data on solar insolation, air temperature, load consumption, electricity net energy metering (NEM) prices, and the limitation of PV power exporting to the grid. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Hybrid PV and battery system sizing for commercial buildings in Malaysia: A case study of FKE-2 building in UTeM by Hossain, Jahangir, Shareef, Hussain, Hossain, Md. Alamgir, Kalam, Akhtar, Abdul Kadir, Aida Fazliana

    Published 2024
    “…To achieve this, a rule-based energy management system with peak-shaving is implemented using the particle swarm optimization algorithm. The optimization process takes into account actual annual data on solar insolation, air temperature, load consumption, electricity net energy metering (NEM) prices, and the limitation of PV power exporting to the grid. …”
    Get full text
    Get full text
    Get full text
    Article