Search Results - (( developing building protocol algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- protocol algorithm »
- data visualization »
- building protocol »
- java »
-
1
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
3
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008“…Second, involving more remote nodes becoming seed nodes for further discoveries. Four different algorithms have been investigated; (i) Farthest/Farthest Algorithm, (ii) Farthest/Nearest Algorithm, (iii) Nearest/Farthest Algorithm and (iv) Nearest/Nearest Algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
5
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
6
-
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system
Published 2007“…The development of wireless sensor networks (WSN) can be motivated by several types of applications such as habitat monitoring, smart health care system, building automation, and etc. …”
Get full text
Get full text
Conference or Workshop Item -
9
Strategies for effective value management practice in construction industry
Published 2017“…This dissertation explores the development of VM methodology through the joint use of a finite element software (Etabs) and genetic algorithm (GA) optimisation design to minimise the cost value of buildings by optimising structural elements. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
11
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…In this paper, we investigate the scalability problem of these routing protocols. In particular, a Position-Based QoS Multicast Routing Protocol (PBQMRP) has been developed. …”
Get full text
Get full text
Article -
12
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
Get full text
Get full text
Conference or Workshop Item -
13
Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm
Published 2023“…Secondly, building upon the work of previous researchers, who have suggested the development of hybrid models to improve accuracy, this research introduces a novel methodology incorporating an ANN optimized using the GCAOA-ANN to predict the routing algorithm employed by the NoC-based MPSoC. …”
Get full text
Get full text
Article -
14
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…(Open network) OPNET 11.5 modeler is used to build the WMNs. The performance of the network and the routing protocols has been studied in means of network throughput, End-to-End delay, routing protocol overhead and the mobility. …”
Get full text
Get full text
Thesis -
15
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
16
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
Get full text
Get full text
Thesis -
17
-
18
Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin
Published 2023Get full text
Get full text
Conference or Workshop Item -
19
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Integration Of Machine Vision In Industrial Robot For Automated Composite Panel Punching
Published 2018“…Secondly, the current KUKA Robot Controller (KRC) 4 does not have the capability to communicate with an external device due to the controller safety protocol. The aim of this research is to build a machine vision algorithm for assisting KUKA robot in recognizing and calibrating various shapes of composite panels precisely. …”
Get full text
Get full text
Thesis
