Search Results - (( things application using algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- things application »
- java application »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
4
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
5
-
6
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
7
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
8
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
9
-
10
-
11
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Real-time time series error-based data reduction for internet-of-things applications
Published 2018Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Development of Image Recognition for Underwater Vehicle Applications
Published 2011“…It is also expected to recognize biological underwater object to support on deck auto monitoring system. The developed algorithm will be used to recognize relevant underwater object or living thing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
17
-
18
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
19
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper
