Search Results - (( developing alternative function algorithm ) OR ( java data connection algorithm ))
Search alternatives:
- developing alternative »
- alternative function »
- connection algorithm »
- function algorithm »
- data connection »
- java »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
4
A block cipher based on genetic algorithm
Published 2016“…This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. …”
Get full text
Get full text
Get full text
Thesis -
5
Alternative method for economic dispatch utilizing grey wolf optimizer
Published 2015“…Although several optimization methodologies have been developed for solving ED problems, the complexity of the task reveals the necessity for development of efficient algorithms to accurately locate the optimum solution. …”
Get full text
Get full text
Thesis -
6
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
9
An Improved Artificial Immune System Based On Antibody Reminder Method For Mathematical Function Optimization
Published 2010Get full text
Get full text
Conference or Workshop Item -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
12
Agreement options for negotiation on material location decision of housing development
Published 2020“…It will need the development of trade-off algorithms to analyze value of technical solution in real time. …”
Get full text
Get full text
Article -
13
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
14
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…Five (5) Alternative Algorithm Design Techniques (AADTs) were developed and investigated for suitability in providing process planning solutions suitable for reconfigurable manufacturing. …”
Get full text
Get full text
Thesis -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…In realizing this concept, we consider the advantages of data passing between two web services which each are connected with one or multiple set of clusters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Using laguerre functions to improve the tuning and performance of predictive functional control
Published 2019“…This paper proposes a novel modification to the predictive functional control (PFC) algorithm to facilitate significant improvements in the tuning efficacy. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
18
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…Here, in this work, to develop the symmetry-based efficient channel equalization in wireless communication, this paper proposes a modified form of bat algorithm trained with ANN for channel equalization. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
20
Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization
Published 2022“…The ANN model topology is designed using selection from the best training algorithm, transfer function, number of training runs (1000-5000), number of hidden layers (1-3) and nodes (5-15). …”
Get full text
Get full text
Thesis
