Search Results - (( data replication sensor algorithm ) OR ( java application among algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks by Hussein, Hussein A. M, Abdul Rahim, Sharafiz, Mustapha, Faizal B., Krishnan, Prajindra S., Abdul Jalil, Nawal Aswan

    Published 2025
    “…The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali by Mohamad Ghazali, Muhammad Ashraf

    Published 2025
    “…The hardware integration combines vibration sensor, DC motor with encoders and Arduino Uno microcontroller that supported by Python for real-time data processing, user interface visualization and data storage. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
    Get full text
    Get full text
    Thesis