Search Results - (( java application sensor algorithm ) OR ( data protection system algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of data coming from diverse points of intelligent electronic devices. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…With the association rule in hand, a distance relay performance analysis Expert System called Protective Relay Analysis System (PRAY) had been designed. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The prime focus is on file locking techniques, state maintenance of file locks and layouts, data compression and data protection across network attached storage and parallel network file system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Cryptographic Algorithm Using Matrix Inversion as Data Protection by Zirra, Peter B., Wajiga, G.M.

    Published 2011
    “…The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Development of Lightning Protection System (LPS) Designing Tool by Idris, Samueil

    Published 2015
    “…Where, Lightning Protection Systems is a system that is installed on building structures to protect it from the lightning strike being diverted. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12
  13. 13

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz by Abdul Mu'izz, Dinie Haqeemy

    Published 2024
    “…The system continuously monitors the load on the system and uses advanced algorithms detect and prevent overloads. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Novel rule base development from IED-resident big data for protective relay analysis expert system by Othman, Mohammad Lutfi, Aris, Ishak, Ananthapadmanabha, Thammaiah

    Published 2016
    “…However, manual handling of overwhelming volume of relay resident big data and heavy dependence on the protection experts’ contrasting knowledge and inundating relay manuals have hindered the maintenance of the Expert Systems. …”
    Get full text
    Get full text
    Book Section
  20. 20

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…This discovery suggests that selecting appropriated algorithms for data encryption in different ranges of data size affects processing time supporting Medical Emergency System.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper