Search Results - (( java application sensor algorithm ) OR ( sequence communication based algorithm ))
Search alternatives:
- sequence communication »
- communication based »
- application sensor »
- java application »
- sensor algorithm »
-
1
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008Get full text
Get full text
Conference or Workshop Item -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
3
Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm
Published 2025“…Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
BSRCA: Biological sequence analysis approach to robotic soccer with cellular automata classifier
Published 2008“…A technique for selecting strategies based on sequence analysis is adopted.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…Based on the results, it was shown that the proposed block cipher algorithm has successfully passed 15 NIST Statistical Tests. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
10
Preliminary analysis of malware detection in opcode sequences within IoT environment
Published 2020“…This paper attempts to provide a preliminary analysis for malware detection within data generated by IoT-based devices and services in the form of operational codes (Opcode) sequences. …”
Get full text
Get full text
Get full text
Article -
11
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The effective lossless compression method, effective data structure, and DNA (Deoxyribonucleic Acid) data searching are quite essential as they provide a stimulus to easy accessibility and communication. The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
-
15
Time-domain RLS-based channel estimation for MIMO OFDM systems
Published 2007Get full text
Get full text
Conference or Workshop Item -
16
Implementation frequency translation by adapting digital phase shifter for WCDMA using XILINX
Published 2009Get full text
Get full text
Student Project -
17
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Improved Distributed Wyner-Ziv Video Coding Based On Reed Solomon Error Correction Scheme And Frame Estimation For Wireless Transmission
Published 2015“…Based on the experiment results, the proposed model achieves a reduction of about 9.3% to 9.4 % in processing time, depending on the input video sequence, with acceptable quality of output video sequence. …”
Get full text
Get full text
Thesis -
19
Complexity algorithm analysis for edit distance
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The proposed model is able to protect the DNA sequence stored in the Fog Computing cloud from plain text attacks by generating (I) the main key, which is the key to the EAES encryption algorithm, (II) the rule 1 key, which represents the DNA base number of possible key probabilities, and (III) the rule 2 key, which represents the number of binding probabilities for the DNA helical structure. …”
Get full text
Get full text
Get full text
Get full text
Thesis
