Search Results - (( java implementation bees algorithm ) OR ( using continuous usage algorithm ))
Search alternatives:
- java implementation »
- implementation bees »
- continuous usage »
- usage algorithm »
- bees algorithm »
-
1
An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks
Published 2018“…In this work, an energy based cluster head selection unequal clustering algorithm (ECH-DUAL) using dual (static and mobile) sink is proposed. …”
Get full text
Get full text
Article -
2
Projecting image on non-planar surface with zero-th order geometric continuity using simple dual-linear function and manipulation of strict integer implementation in programming la...
Published 2015“…Usage of a projection system to display large screen images is still relevant in the midst of LED-based display increasing popularity.This is due to that the system itself is a mature technology, reliable and cheaper than the LED counterpart.While various methods had addressed the projection problems on curve surface, projecting image on jagged like surface (zero order geometric continuity) has yet to be studied in depth.This paper proposes a method for projecting image on non-planar surface with zero-order geometric continuity property using parametric modeling.The method manipulate linear function by combining two functions into one by taking advantage of computer programs strict implementation of integer variables.The method was applied to grid-based texturing algorithm in order to create the desired zero-continuity effect on the surface.The method was compared with texturing that implement existing curve algorithm to project image on the screen.Visual evaluation results showed that the proposed method fared better compared to existing curve-based projection algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz
Published 2024“…The system continuously monitors the load on the system and uses advanced algorithms detect and prevent overloads. …”
Get full text
Get full text
Student Project -
4
Quranic Cross-Lingual Information Retrieval Optimization using Hexadecimal Conversion Algorithm
Published 2024“…Therefore, this research proposed the Quran Hexadecimal (QuHex) model as the solution to represent the words of the Holy Quran by using hexadecimal conversion algorithm to improve machine readability at the presentation layer. …”
Article -
5
ROBOT IN A RECONFIGURABLE MAZE
Published 2013“…Autonomous vehicles have existed since several decades and they continue to evolve promptly. Their usage in different domains made them an interesting area for academic researchers as well as governments’ projects. …”
Get full text
Get full text
Final Year Project -
6
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Malware detection is needed due to the malware continuously evolve rapidly. This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
7
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
8
Effective routing protocol for wireless sensor networks using CRT-leach algorithm / Kamaldeen Ayodele Raji, Ayisat Wuraola Asaju-Gbolagade and Kazeem Alagbe Gbolagade
Published 2021“…The consequences of exploratory reproductions show that the proposed structure delivered powerful directing convention for WSNs when contrasted with existing routing protocols to the extent essentialness usage, speed, equipment necessities and transformation delay continuously WSNs.…”
Get full text
Get full text
Get full text
Article -
9
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
10
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…The continuous increase in the use of digital data transmission over a network and it exposed to the various kinds of attacks, unauthorized access and network hacking. …”
Get full text
Get full text
Get full text
Article -
11
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
Get full text
Get full text
Thesis -
12
Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan
Published 2020“…In this system, Forward Chaining in Rule-Based algorithm is used to filter user’s preferences and Web-Scraping technique is used to extract data and information from websites. …”
Get full text
Get full text
Thesis -
13
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
14
Design and implementation of a portable signal analyzer for residence Low Voltage (LV)
Published 2023“…The Bluetooth connection are used between prototype and smartphone. All required information are being displayed continuous and refresh the data every one seconds. …”
text::Final Year Project -
15
Suitability of using symmetric key to secure multimedia data: an overview,
Published 2010“…With the increasing and continuous use of digital communications on the internet in recent times, security is becoming more and more relevant and important. …”
Get full text
Get full text
Get full text
Article -
16
A review on multimedia communications cryptography
Published 2011“… Now-a-days, Due to the repaid increasing and continuous use of multimedia communications on the internet, Security is becoming more and more relevant and important. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Automated Accident Location Detection System (Extended)
Published 2013“…The author is extending the project from the previous final year student. He will be continuing to do the server gateway, website system and implementation of algorithm in Automated Accident Location Detection System. …”
Get full text
Get full text
Final Year Project -
19
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…It is also a technology revolution, offering flexible IT usage in a cost efficient and pay-per-use manner. …”
Get full text
Get full text
Thesis -
20
Hexadecimal Submission-Combination For Quranic-Arabic Words Information Retrieval
Published 2024thesis::master thesis
