Search Results - (( things application using algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- things application »
- java application »
- using algorithm »
-
1
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
2
-
3
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
4
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
5
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
6
-
7
-
8
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Real-time time series error-based data reduction for internet-of-things applications
Published 2018Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Development of Image Recognition for Underwater Vehicle Applications
Published 2011“…It is also expected to recognize biological underwater object to support on deck auto monitoring system. The developed algorithm will be used to recognize relevant underwater object or living thing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
14
-
15
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
16
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
18
Optimal load shedding in power system using back tracking search algorithm
Published 2024text::Final Year Project -
19
A study on personalized recommender system using social media
Published 2020“…The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…This report discusses the design of monitoring and control system using Internet of Things (IoT) based power limiter, which is designed to monitor and manage electricity consumption in real-time. …”
Get full text
Get full text
Book Section
