Search Results - (( data replication ((sensor algorithm) OR (path algorithm)) ) OR ( java application a algorithm ))

Refine Results
  1. 1
  2. 2

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases by Ainul Azila Che Fauzi, Ainul Azila, Noor Ashafiqa, Noor Ashafiqa, Asiah Mat, Asiah, Syerina Azlin Md Nasir, Syerina Azlin, A. Noraziah, Noraziah

    Published 2025
    “…Experimental results demonstrate that BVAC sustains fault tolerance, achieves cloud database replication efficiency, and sustains high data availability via multiple valid quorum paths. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks by Hussein, Hussein A. M, Abdul Rahim, Sharafiz, Mustapha, Faizal B., Krishnan, Prajindra S., Abdul Jalil, Nawal Aswan

    Published 2025
    “…The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2016
    “…The paper emphases on replicating data packets and distribute them to different relays. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2015
    “…The paper emphases on replicating data packets and distribute them to different relays. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Revolutionizing energy infrastructure: Automated route planning for underground transmission lines in Phnom Penh by Saing, Kimlin, Goh, Hui Hwang, Zhang, Dongdong, Dai, Wei, Kurniawan, Tonni Agustiono, Goh, Kai Chen

    Published 2024
    “…Multiple algorithms are evaluated to identify the most effective solution to this design’s inherent shortest-path problem. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model by Norhaida, Binti Hussain, Wai Shiang, Cheah, Wai Loke, Seng

    Published 2025
    “…The evaluation states that the existing agent-based steering model computes the complete set of collision-free paths with the least travel time among agents to make path decisions based on updated information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis