Search Results - (( using mitigation method algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A Hybrid K-Means Hierarchical Algorithm for Natural Disaster Mitigation Clustering by Prasetyadi, Abdurrakhman, Nugroho, Budi, Tohari, Adrin

    Published 2022
    “…Therefore, the proposed hybrid algorithm can provide relatively homogeneous clustering results in natural disaster mitigation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…Then the next step was to test the mitigation algorithm, the same above scenarios of attack were repeated and the entropy change after the mitigation was observed. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8

    Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter by Mohamad @ Abd Rahman, Syahrul Hisham, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abd. Wahab, Noor Izzri, Jidin, Auzani

    Published 2023
    “…The algorithm's effectiveness in operation for the Shunt APF is validated through simulation using MATLAB/Simulink and experiment work by integrating the algorithm with DSPACE RS1104. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  11. 11

    SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER by MIZA, BELIA

    Published 2019
    “…In addition, this objective of this paper is to study of method of harmonics mitigation using the designed active filter to obtain better quality of signal in power system. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…A combination of three methods, namely optimization, global random search and ambiguity function mapping has produced an efficient and robust mitigation technique. …”
    Get full text
    Get full text
    Article
  13. 13

    Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity by Dehkordi, Sepehr Ghasemi

    Published 2014
    “…Passive method involves the use of enclosures, barriers and silencers but is ineffective at low frequency noise (below 500Hz). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…The simulation results demonstrate that the algorithm can minimize the limitations of the existing methods and it can use the PV generation system effectively. …”
    Get full text
    Get full text
    Article
  16. 16

    GEOSPATIAL TEMPORAL FRAMEWORK ON LANDSLIDES MITIGATION STRATEGIES FOR PIPELINES by IBRAHIM, MUHAMMAD BELLO

    Published 2023
    “…These improvements in landslide susceptibility mapping were used to establish a landslide mitigation strategies framework for pipelines. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    HARMONIC MITIGATION USING SHUNT ACTIVE POWER FILTER BASED ON SYNCHRONOUS REFERENCE FRAME THEORY by Irdina Izzati, Abdul Harun

    Published 2023
    “…The used of synchronous reference frame theory (SRF) for harmonic signal extraction holds promise for future developments in harmonic mitigation techniques.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Machine Learning in Asphaltenes Mitigation by Qasim, A., Lal, B.

    Published 2023
    “…The machine and deep learning methods included Bayesian belief network (BBN), Least-squares support vector machine (LSSVM), Support vector regression (SVR) and Genetic algorithm-support vector regression (GA-SVR). …”
    Get full text
    Get full text
    Book
  20. 20

    A Comparison of Two Methods Using R.M.S. Value and Wavelet-Based Mann and Morrison Algorithm for Voltage Dip Characterization by Abd Halim, Syahirah

    Published 2009
    “…Another method is a combination of wavelet-based analysis using Mann and Morrison algorithm which estimates the amplitude and the phase angle to characterize the dips. …”
    Get full text
    Get full text
    Final Year Project