Search Results - (( process certification means algorithm ) OR ( java application sensor algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…In particular, the Certificate Authority is a single entity that leads to a single point of failure, while the Attribute Authority works independently. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Developing students' mathematical thinking: how far have we came? by Md. Yunus, Aida Suraya

    Published 2015
    “…Several findings from studies that focused on students' ability to provide reasoning and give meanings to concepts and algorithms are highlighted. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture