Search Results - (( quality function sensor algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- sensor algorithm »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
4
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…The outcome of the research showed that the functionality of the newly developed image computer algorithm analysis coupled with the silicone tactile sensor is able to facilitate in biomedical applications such as in endoscopic surgery for measurement of tissue softness thus overcoming some of the current limitations of tactile sensor.…”
Get full text
Get full text
Thesis -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
-
7
The Multi-Objective Optimization Algorithm Based on Sperm Fertilization Procedure (MOSFP) Method for Solving Wireless Sensor Networks Optimization Problems in Smart Grid Applicatio...
Published 2018“…Different packet payload sizes are supplied to the algorithms and their optimal value is derived. From the experiments, the knee point and the intersection point of all the obtained Pareto fronts for all the algorithms show that the optimal packet payload size that manages the trade-offs between the four objective functions is equal to 45 bytes. …”
Get full text
Get full text
Article -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks
Published 2024“…IWD is a qualified stochastic optimization tool adept at minimizing objective functions. In IWDSA, SA is integrated to enhance solution quality and prevent IWD from getting trapped in local minima. …”
Get full text
Get full text
Get full text
Article -
12
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
14
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…This thesis presents three decentralized algorithms that are robust,scalable, and can be successfully executed in sensor networks. …”
Get full text
Get full text
Thesis -
15
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Smart fall detection by enhanced SVM with fuzzy logic membership function
Published 2023“…Smart fall detection is a technology that depends on sensors and auxiliary devices that seek to improve the quality of life and enhance the lifestyle of disabled people. …”
Get full text
Get full text
Get full text
Article -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
18
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…I choose this type of sensor is because it can send and receive signal only using one sensor. …”
Get full text
Learning Object -
19
Single-objective and multi-objective optimization algorithms based on sperm fertilization procedure / Hisham Ahmad Theeb Shehadeh
Published 2018“…The results show that the proposed SOOA outperformed other SOOAs algorithms in term of convergence and quality of the result. …”
Get full text
Get full text
Get full text
Thesis -
20
Applications of IoT and Artificial Intelligence in Water Quality Monitoring and Prediction: A Review
Published 2023Conference Paper
