Search Results - (( java application sensor algorithm ) OR ( sequence communication based algorithm ))

Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm by Qianru, Lu, Kuryati, Kipli, Tengku Mohd Afendi, Zulcaffle, Yuan, Liu, Xiangju, Liu, Bo, Wang

    Published 2025
    “…Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    BSRCA: Biological sequence analysis approach to robotic soccer with cellular automata classifier by P., Kiran Sree, I., Ramesh Babu, N.S.S.S.N, Usha Devi

    Published 2008
    “…A technique for selecting strategies based on sequence analysis is adopted.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…Based on the results, it was shown that the proposed block cipher algorithm has successfully passed 15 NIST Statistical Tests. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Preliminary analysis of malware detection in opcode sequences within IoT environment by Ahmed, Firas Shihab, Mustapha, Norwati, Mustapha, Aida, Kakavand, Mohsen, Mohd Foozy, Cik Feresa

    Published 2020
    “…This paper attempts to provide a preliminary analysis for malware detection within data generated by IoT-based devices and services in the form of operational codes (Opcode) sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    DNA sequences compression by GP2R and selective encryption using modified RSA technique by Hossein, Syed Mahamud, De, Debashis, Mohapatra, Pradeep Kumar Das, Mondal, Sankar Prasad, Ahmadian, Ali, Ghaemi, Ferial, Senu, Norazak

    Published 2020
    “…The effective lossless compression method, effective data structure, and DNA (Deoxyribonucleic Acid) data searching are quite essential as they provide a stimulus to easy accessibility and communication. The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Improved Distributed Wyner-Ziv Video Coding Based On Reed Solomon Error Correction Scheme And Frame Estimation For Wireless Transmission by Chiam, Kin Honn

    Published 2015
    “…Based on the experiment results, the proposed model achieves a reduction of about 9.3% to 9.4 % in processing time, depending on the input video sequence, with acceptable quality of output video sequence. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…The proposed model is able to protect the DNA sequence stored in the Fog Computing cloud from plain text attacks by generating (I) the main key, which is the key to the EAES encryption algorithm, (II) the rule 1 key, which represents the DNA base number of possible key probabilities, and (III) the rule 2 key, which represents the number of binding probabilities for the DNA helical structure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis