Search Results - (( messaging application sensor algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1
  2. 2

    An Improved Distributed Scheduling Algorithm for Wireless Sensor Networks by Sheikh, Muhammad Aman, Drieberg , Micheal, Zain Ali, Noohul Basheer

    Published 2012
    “…The emergence of high data rate, low power consumption and small size sensor network applications, has increased the demand for high-performance network services. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8
  9. 9

    Implementation and analysis of an updating data strategy on iot-waspmote gases testbed with 2.4 ghz xbee for air quality application by Alduais, N.A.M., Abdullah, Noryusliza, Abdullah, J, Jamil, A, H. Y. Saad, Abdul-Malik

    “…In addition, there is no delay in receiving data from the sensor node after applying the algorithm compared to directly transmitting data…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Effective routing protocol for wireless sensor networks using CRT-leach algorithm / Kamaldeen Ayodele Raji, Ayisat Wuraola Asaju-Gbolagade and Kazeem Alagbe Gbolagade by Ayodele Raji, Kamaldeen, Asaju-Gbolagade, Ayisat Wuraola, Gbolagade, Kazeem Alagbe

    Published 2021
    “…Accordingly, it is necessary to structure vitality proficient steering conventions for WSNs applications. Chinese Remainder Theorem (CRT)- based packet splitting integrated with Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm routing protocol was proposed so as to decrease vitality utilization during correspondence and improve message dependability in WSNs. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  13. 13

    Vault’s floor security sensor with RFID access using microcontroller: article / Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…The algorithm for the RFID access and the security sensor was commercial software to control the microcontroller and interfacing circuits.…”
    Get full text
    Get full text
    Article
  14. 14

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Vault's floor security sensor with RFID access using microcontroller/ Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…The algorithm for the RFID access and the security sensor was performed on a commercial software to control the microcontroller and interfacing circuits.…”
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient network mobility management for a 6LoWPAN mobile network in hospital environments by Shahamabadi, Mohammadreza Sahebi

    Published 2017
    “…Then, by using the proposed message-scheduling algorithm, end-to-end delay in NEMO-HWSN is reduced by approximately 20%. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Investigative analysis of clustering routing protocols for scalable sensor networks by Salami, A. F., Anwar, Farhat, Aibinu, A. M., Bello-Salau, H, Hassan Abdalla Hashim, Aisha

    Published 2011
    “…As a result, the focus and effort of researchers is on designing better routing algorithms for a given application and network architecture of interest. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers