Search Results - (( processes specification sensor algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…These networks typically consist of hundreds to thousands of sensor nodes deployed across the target area. Each sensor node is responsible for collecting specific data and transmitting it to the processing center. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…Because of these attributes, it requires to be efficiently allocated and effectively processed. In the case of random mobile sensors, a huge number of packets are generated, which exacerbated the burden of indexing the mobile sensors' reports, because of dependability on packets' attributes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Wavelet-based pre-filtering for low cost inertial sensors by Hasan, Ahmed Mudheher, Samsudin, Khairulmizam, Ramli, Abdul Rahman, Raja Abdullah, Raja Syamsul Azmir

    Published 2010
    “…This study proposed to de-noise the IMU signal by effectively band-limiting the signal at the output of each inertial measurement sensor prior to its mechanization and further processing by the Strapdown INS (SDINS) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Square groove detection based on forstner with canny edge operator using laser vision sensor by Mohammed Naji, Osamah Abdullah Ahmed

    Published 2023
    “…The acquisition of 1he weld image is a complicated process, resulting in a large amotmt of noise. Specific me1hods must be used to process images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    VHDL modeling of optimum measurement selection by using genetic algorithm by Ullah, Mohammad Habib, Hasan, Muhammad Asfarul, Uddin, Md. Jasim, Priantoro, Akhmad Unggul

    Published 2009
    “…A Genetic Algorithm (GA) that is going to be a part of a system for obtaining optimum sensor measurements for a specific process. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…In the recent era, researchers used different routing algorithms to decrease the power consumption in order to increase the wireless sensor network life. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20