Search Results - (( java implementation level algorithm ) OR ( data selection sensor algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors by AlRijeb, Mothena Fakhri Shaker, Othman, Mohammad Lutfi, Ishak, Aris, Hassan, Mohd Khair, Albaker, Baraa Munqith

    Published 2025
    “…The soft sensor was designed using several stages, including data collection, preprocessing, clustering, feature selection, and classification. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…The third proposed algorithm achieves an adaptive data gathering strategy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Performance of various forecasting algorithms to reduce the number of transmitted packets by sensor node in wireless sensor networks by Husni, Muhammed Ihsan

    Published 2018
    “…Additionally, in terms of absolute error in the data at the sink, the EDCD1 algorithm shows the best performance with less average error at 2.2803 for all sensors compared to others algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din by Wan Din, Wan Isni Sofiah

    Published 2016
    “…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks by Alagirisamy, Mukil, Chow, Chee Onn

    Published 2018
    “…In our algorithm, tentative cluster head is selected based on energy based timer, residual energy, node IDs and trust value. …”
    Get full text
    Get full text
    Article
  9. 9

    Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din by Wan Din, Wan Isni Sofiah

    Published 2017
    “…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…Wireless sensor networks (WSNs) composed from a large number of sensor node with the ability to sense and process data in the physical world in a timely manner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy by Mukil , Alagirisamy

    Published 2020
    “…Wireless sensor nodes deployed in sensing field aggregate enormous amount of sensed data and transfer them to the sink. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Predetermined path of mobile data gathering in wireless sensor networks based on network layout by Ghaleb, Mukhtar, Subramaniam, Shamala, Othman, Mohamed, Ahmad Zulkarnain, Zuriati

    Published 2014
    “…Data gathering is among the issues constantly acquiring attention in the area of wireless sensor networks (WSNs). …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster by Ali, Wala'a Hussein

    Published 2018
    “…In wireless sensor networks, data aggregation algorithms are used to extend the network lifetime Size of data transmission from the cluster head node to base station show a critical role in CH nodes energy consumption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Cluster Heads (CHs), selected through a range of metrics, are responsible for data aggregation and transmission to the Base Station (BS). …”
    Article
  16. 16

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Genetic Algorithm based Chain Leader Election in Wireless Sensor Network for Precision Farming by Hamzarul Alif Hamzah, Norah Tuah, Lim, Kit Guan, Tan, Min Keng, Ismail Saad, Tze, Kenneth,Kin Teo

    Published 2020
    “…Conventionally, PEGASIS protocol selects chain leader without considering the distance and residual energy level of each sensor node. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  20. 20

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article