Search Results - (( developing data connection algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- connection algorithm »
- application stemming »
- stemming algorithm »
- java application »
- developing data »
- data connection »
-
1
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
2
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
3
-
4
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…The self-healing algorithm is design to reduce human intervention and continuous data collected in the remote areas. …”
Get full text
Get full text
Conference or Workshop Item -
5
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
Get full text
Get full text
Thesis -
6
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
7
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
Get full text
Get full text
Thesis -
8
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…To evaluate the effectiveness of the algorithm, simulation case studies have been conducted with actual load data and actual PV generation data. …”
Get full text
Get full text
Article -
9
The use of people rank technique for data dissemination in opportunistic network
Published 2015Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
Get full text
Get full text
Thesis -
11
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
Get full text
Get full text
Article -
12
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
13
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…The enhancement reaped from the developed selection algorithm is expected to bring benefit to different user at various places…”
Get full text
Get full text
Get full text
Article -
14
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
15
Coverage and connectivity maximization for wireless sensor networks using improved chaotic grey wolf optimization
Published 2025“…Efficient network coverage and connectivity in wireless sensor networks (WSNs) is critical for modern data-driven applications requiring seamless data collection and transmission. …”
Get full text
Get full text
Get full text
Article -
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
17
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…In the last decade, the demand for Internet applications has been increased, which increases the number of data centers across the world. These data centers are usually connected to each other using long-distance and high-speed networks. …”
Get full text
Get full text
Get full text
Article -
18
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
Get full text
Get full text
Get full text
Thesis -
19
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…A noise model has been developed to test the reliability of the proposed algorithm. …”
Get full text
Get full text
Thesis -
20
Characterization of Internet Traffic in UUM Wireless Networks
Published 2012“…The trace composes of two parts: firstly, one that connects to the core switch in computer center which is connected with the distribution switches that link the Access Point (APs) with the wireless network at campus, and secondly, another one for the measurement of bulk data transfers and interactive data exchange between two nodes in UUM library, which had been initiated at that time. …”
Get full text
Get full text
Get full text
Get full text
Thesis
