Search Results - (( java application sensor algorithm ) OR ( after implementation case algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Multi-objective optimisation of assembly line balancing type-e problem with resource constraints by Masitah, Jusop

    Published 2016
    “…The validation phase from the industrial case study concluded that the proposed methodology and algorithm can be implemented in industries. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem, Hayder Natiq, Ahmad Zukarnain, Zuriati, Mohamed, Othman, Subramaniam, Shamala

    Published 2010
    “…Now and after got this results as low delay for bottleneck link case, we know the New-AIMD mechanism work as well under the network condition in the experiments.…”
    Get full text
    Get full text
    Article
  7. 7

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…The machine learning algorithm, Support Vector Machine was chosen after comparing it with other algorithms such as Multinomial Naïve Bayes, Decision Tree Classifier, and Random Forest Classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60 by Ngui,, Lin Hui.

    Published 2009
    “…The programming language used in this project is Mobile Python or PyS60 and the written source code is executed on the S60 device mobile platform, whic h is the Nokia N95 in this case. Experimental results are obtained through test s conducted and after several analyses; it is found out that RGB - H - CbCr presents the best algorithm to be used in e xtracting the human skin colour, after a slight modification.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2018
    “…Based on literature, stereo algorithm is already being implemented to solve the distance measurement problem. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  15. 15

    Automated call receiving and forwarding mechanism for supporting integrated disaster management system by Khamis, N.A., Chin Yang, L., Nordin, A.

    Published 2014
    “…The efficiency of the algorithm is evaluated by comparing the response time of the current procedures with the implementation of the algorithm in the proposed prototype. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Performance study of adaptive filtering algorithms for noise cancellation of ECG signal by Islam S.Z., Islam S.Z., Jidin R., Ali M.A.M.

    Published 2023
    “…In this paper, the four types of AC and DC noises have been implemented according to their basic properties. After that, these noises have been mixed with ECG signal and nullify these noises using the LMS and the RLS algorithms. …”
    Conference paper
  17. 17

    Automated call receiving and forwarding mechanism for supporting integrated disaster management system by Khamis, Norazlina, Lee , Chin Yang, Nordin, Azlin

    Published 2014
    “…The efficiency of the algorithm is evaluated by comparing the response time of the current procedures with the implementation of the algorithm in the proposed prototype. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
    Get full text
    Get full text
    Thesis