Search Results - (( java implementation _ algorithm ) OR ( changes adaptation sensor algorithm ))

Refine Results
  1. 1
  2. 2

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography by Tian, Wenbin, Ramli, Mimi Faisyalini, Yang, Wuqiang, Sun, Jiangtao

    Published 2020
    “…By simulation, it is found notably that the relaxation factor should be selected adaptively according to the sensor structure (e.g. the number of electrodes) and the permittivity distribution in capacitance measurements. …”
    Get full text
    Get full text
    Article
  5. 5

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…In this thesis, a new quaternion gradient based adaptive algorithm for FIR adaptive filter is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Self-Schedule and Self-Distributive MAC Scheduling Algorithms for Next-Generation Sensor Networks by Bakhsh, S.T., Aman Sheikh, M., Alghamdi, R.

    Published 2015
    “…The proposed algorithms do not require any synchronization and can effectively adapt to dynamic topology changes without incurring global communication overhead. …”
    Get full text
    Get full text
    Article
  8. 8

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…The aim of this research is to improve the efficiency of the phase synchronisation algorithm in order to achieve collaborative beamforming (CB) in wireless sensor networks (WSNs). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…The aim of this research is to improve the efficiency of the phase synchronisation algorithm in order to achieve collaborative beamforming (CB) in wireless sensor networks (WSNs). …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Sensorless Adaptive Fuzzy Logic Control Of Permanent Magnet Synchronous Motor by Hafz Nour, Mutasim Ibrahim

    Published 2008
    “…The design and optimisation of the FLC are carried out using an adaptive fuzzy inference system network that uses the backpropagation, least square and gradient algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
    Article
  12. 12

    A NEW ENERGY EFFICIENT ADAPTIVE HYBRID ERROR CORRECTION TECHNIQUE FOR UNDERWATER WIRELESS SENSORS NETWORKS by HASSAN, AMMAR ELYAS BABIKER HASSAN

    Published 2011
    “…The adaptation algorithm which depends on PAR has also been applied in adaptation to the ARRTP which originally depends only on inter-node distance in adaptation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An Improved Distributed Scheduling Algorithm for Wireless Sensor Networks by Sheikh, Muhammad Aman, Drieberg , Micheal, Zain Ali, Noohul Basheer

    Published 2012
    “…First, it optimizes energy through collision free transmission by scheduling conflict-free slots. Second, it can adapt the changes in topology explicitly without reconstructing the global transmission schedule with minimum message overhead. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  20. 20

    Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks by Pillay, Kosheila Sundram

    Published 2019
    “…A wireless sensor network (WSN) consists of a group of sensor nodes which communicate changes in the environment to a base station. …”
    Get full text
    Get full text
    Thesis