Search Results - (( java implementation developing algorithm ) OR ( iot implementation using algorithmic ))
Search alternatives:
- implementation developing »
- implementation using »
- java implementation »
- iot implementation »
- algorithmic »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
2
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…An approach capable of recognizing an audio piece of music with an accuracy equal to 90% was further tested based on this result. In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
3
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
6
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
7
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
8
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
11
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
12
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
Get full text
Get full text
Thesis -
13
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
14
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
Get full text
Get full text
Get full text
Book -
15
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. The model examined anomalies, commonly referred to as botnets, in a cluster of IoT devices attempting to connect to a network. …”
Get full text
Get full text
Article -
16
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…IoT is considered a widely recognized implementation that includes intelligent health care, intelligent transport, and intelligent grids. …”
Get full text
Get full text
Article -
17
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…This was achieved through data transfer using Amazon Web Service (AWS-IoT) cloud connection. …”
Get full text
Get full text
Thesis -
18
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…The Internet of Things (IoT) is an expanding paradigm of object connectivity using a range of resource types and architectures to deliver ubiquitous and requested services. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
20
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article
