Search Results - (( developing agent connection algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Semantic-Based Scalable Decentralized Resource Discovery by Mahamat Issa , Hassan, Azween, Abdullah

    Published 2010
    “…We develop a RD algorithm that optimizes the search of the resources on the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Analysis of a multilevel voltage-based coordinating controller for solar-wind energy generator: a simulation, development and validation approach by Sarban Singh, Ranjit Singh, Lachumanan, Thilagawathy, Shapiai, Mohd Ibrahim, Thangaraj, Joseph Sahaya Anand

    Published 2021
    “…The developed model has different tasks to perform when solar-wind energy sources both produce output voltages simultaneously, also contributing to solving the requirements of different synchronization algorithms for a multi-agent renewable energy system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Semantic-Based Scalable Decentralized Grid Resource Discovery by Mahamat Issa , Hassan, Azween, Abdullah

    Published 2009
    “…We develop a RD algorithm that optimizes the search of the resources on the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…In addition, another two agents have been developed based on Monte Carlo simulation. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Enhanced Mobility Solution In Mobile Ipv6 Network by David, Adeniji Oluwashola

    Published 2008
    “…The solution is important by enterprises in making decision to acquire internet connectivity for the purpose of connectivity redundancy and traffic load distribution optimization. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution by Salih Al-Badri, Qussay Abbas

    Published 2006
    “…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
    Get full text
    Get full text
    Thesis