Search Results - (( developing devices mining algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Novel rule base development from IED-resident big data for protective relay analysis expert system by Othman, Mohammad Lutfi, Aris, Ishak, Ananthapadmanabha, Thammaiah

    Published 2016
    “…Many Expert Systems for intelligent electronic device (IED) performance analyses suchvas those for protective relays have been developed to ascertain operations, maximize availability, and subsequently minimize misoperation risks. …”
    Get full text
    Get full text
    Book Section
  5. 5

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…As a result, numerous attackers or hackers are taking advantage of this chance to employ cryptojacking to gain access to a victim's computer or other device resources and mine cryptocurrency without the users' permission. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    A Review on Predictive Model for Heart Disease using Wearable Devices Datasets by Mohd Syafiq Asyraf, Suhaimi, Nor Azuana, Ramli, Noryanti, Muhammad

    Published 2024
    “…Among the ways to prevent heart disease include analysis of the patient’s historical data, developing predictive modeling involving statistical and machine learning techniques, and monitoring health conditions through wearable devices. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…These parameters are used to develop a standalone intelligently machine learning adaptive distance relay (ML-ADR) modification. …”
    Get full text
    Get full text
    Thesis