Search Results - (( developing data connection algorithm ) OR ( java application _ algorithm ))
Search alternatives:
- connection algorithm »
- java application »
- developing data »
- data connection »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The main objectives for this project are focusing on the development of user interface that can connect with the machine learning build in Microsoft Azure for pump diagnostic purpose. …”
Get full text
Get full text
Monograph -
3
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…Each web services are easily maintainable since there is loose coupling between interacting nodes. The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
5
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
6
Network monopoly / Tan Kean Yeap
Published 2002“…The number of computers in use worldwide, according to the International Data Corporation, is in excss of 100 milion. Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
-
9
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
-
12
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
13
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
14
-
15
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…The self-healing algorithm is design to reduce human intervention and continuous data collected in the remote areas. …”
Get full text
Get full text
Conference or Workshop Item -
16
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
Get full text
Get full text
Thesis -
17
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
18
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
Get full text
Get full text
Thesis -
19
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…To evaluate the effectiveness of the algorithm, simulation case studies have been conducted with actual load data and actual PV generation data. …”
Get full text
Get full text
Article -
20
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
