Search Results - (( java implementation case algorithm ) OR ( based verification sensor algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- verification sensor »
- based verification »
- sensor algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
11
Sensor-less vector control using adaptive observer scheme for controlling the performance of the induction motor / Mazhar Hussain Abbasi
Published 2013“…Simulation is done by using the observer which uses optimal feedback gain as an example of process from algorithm design to verification of logic. Control design scheme in vector control, accuracy of internal parameter such as resister of motor armature and inductance affects control performance. …”
Get full text
Get full text
Thesis -
12
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
13
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…During the tests the weather conditions were fine and acceptable to carry out the experiments These parameters were also selected based on the practical verification experiments. …”
Get full text
Get full text
Thesis -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
Published 2021“…This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.0 environment. …”
Get full text
Get full text
Get full text
Article -
16
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
17
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…Next, the KF programming algorithm managed to diminish the measurement noise including the Main bang and flaw echo of the ultrasonic sensor. …”
Get full text
Get full text
Get full text
Article -
18
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…The experiments demonstrate a fundamental edge operation with a latency of 2.45 ms (milliseconds), while NMAP integration ensures data security and device verification for sensor data storage. The synthetic simulations show positive outcomes for the data fusion-based monitoring system, where alerts are promptly triggered as sensor values change, with an overall system latency of approximately 24 ms. …”
Article -
19
Validation process for electrical charge tomography system using digital imaging technique
Published 2009“…Numerical analysis result based on data measured by sensor indicates that the algorithm is efficient to overcome the numerical instability. …”
Get full text
Get full text
Get full text
Article -
20
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The system is constructed from model-based design (MBD) of the PV system. The MBD is divided into four parts; executable system properties, design and simulation of the properties, execution and implementation for code generation and verification process. …”
Get full text
Get full text
Thesis
