Search Results - (( java application model algorithm ) OR ( _ optimisation sensor algorithm ))
Search alternatives:
- application model »
- java application »
- sensor algorithm »
- model algorithm »
- _ optimisation »
-
1
-
2
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. Based on that analysis, this research suggests a hybrid algorithm: the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy). …”
Get full text
Get full text
Get full text
Thesis -
3
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. Based on that analysis, this research suggests a hybrid algorithm: the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy). …”
Get full text
Get full text
Get full text
Thesis -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Multiple error correction (MEC) for lifetime optimisation in wireless sensor network / Samirah Nasuha Mohd Razali
Published 2019“…The implementation of error correction schemes in Wireless Sensor Network (WSN) can help reduce the error rates and limit the number of flooded retransmissions in the network, which indirectly minimize energy consumption. …”
Get full text
Get full text
Thesis -
6
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
Improvement of routing protocol in wireless sensor network for energy consumption to maximize network lifetime
Published 2013“…We show that existing energy models over-estimate life expectancy of a sensor node by 30–58% and also yield an “optimised” number of clusters which is too large. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
15
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
19
Sensor node placement based on lexicographic minimax
Published 2023“…This paper proposed a sensor nodes placement technique which is based on the lexicographic minimax algorithm. …”
Conference paper -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item
