Search Results - (( java application sensor algorithm ) OR ( data implementation towards algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
    Get full text
    Get full text
    Article
  5. 5

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…In future, the test toward the strength of this enhanced AES-\ 28 bit algorithm should be conducted.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
    Get full text
    Get full text
    Article
  13. 13

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Implementation of 16-QAM alamouti encoder on FPGA for MIMO testbed / Mohd Aminudin Mohd Khalid by Mohd Khalid, Mohd Aminudin

    Published 2014
    “…In this project, a fully orthogonal STBC namely, Alamouti codes is implemented on Polarizone MEMO Testbed platform for data encoding and RF transmission purposes. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Students’ attitude towards video-based learning: machine learning analysis with rapid software / Abdullah Sani Abd Rahman ... [et al.] by Abd Rahman, Abdullah Sani, Meutia, Rita, Hamid, Yusnaliza, Abdul Rahman, Rahayu

    Published 2022
    “…This paper presents the fundamental design and easy implementation of machine learning for education domain useful for the inexpert data scientists in many fields.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A Study Of Salting Method for Image Protection by Ahmad Faeez bin Lukman

    Published 2013
    “…This type of security method is implemented on the password that will be used to gain access to images stored in an online server, and after implemented supposedly the data will be secured and cannot be compromised by internet intruders or also known as hackers. …”
    Other
  19. 19

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…The proposed algorithm have been implemented and tested in the same environment as existing algorithms and the results shows the better improvement achieved compared from the best algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The scale-up experiment showed that the proposed algorithm is more scalable than the other existing algorithms. …”
    Get full text
    Get full text
    Thesis