Search Results - (( things application using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- things application »
- java application »
- using algorithm »
-
1
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
2
-
3
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
4
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
5
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Real-time time series error-based data reduction for internet-of-things applications
Published 2018Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Development of Image Recognition for Underwater Vehicle Applications
Published 2011“…It is also expected to recognize biological underwater object to support on deck auto monitoring system. The developed algorithm will be used to recognize relevant underwater object or living thing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
15
-
16
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
17
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
19
Optimal load shedding in power system using back tracking search algorithm
Published 2024text::Final Year Project -
20
A study on personalized recommender system using social media
Published 2020“…The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
