Search Results - (( developing group connection algorithm ) OR ( java code classification algorithm ))

Refine Results
  1. 1

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  3. 3

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Parallel Optical Window Algorithm Applied to Optical Multistage Interconnection Network by Othman, Mohamed, Abdullah, Monir, Johari, Rozita

    Published 2008
    “…In this paper, a new parallel algorithm of the window method is developed called the Balanced Parallel Window Method (BPWM) algorithm. …”
    Get full text
    Get full text
    Article
  5. 5

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…This research aims to develop an improved model for subspace clustering based on density connection. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…This research aims to develop an improved model for subspace clustering based on density connection. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Functional Connectivity Assessment on Aging Brain using Functional Near Infrared Spectroscopy (fNIRS) by Chan, Yee Ling

    Published 2017
    “…They performed three categories of semantic verbal fluency test while neuronal activity in prefrontal cortex (PFC) measured using fNIRS. A new software algorithm has been developed to derive functional connectivity parameters. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain by Muhammad, Norhidayah, Mohamad Zain, Jasni

    Published 2019
    “…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Extended from the FastZ algorithms, another three new algorithms called the FastRLP, BRLP and FastBRLP algorithms are developed to achieve different performance goals. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automatic localization of the left ventricular blood pool centroid in short axis cardiac cine MR images by Tan, Li Kuo, Liew, Yih Miin, Lim, Einly, Abdul Aziz, Yang Faridah, Chee, Kok Han, McLaughlin, Robert A.

    Published 2018
    “…In this paper, we develop and validate an open source, fully automatic algorithm to localize the left ventricular (LV) blood pool centroid in short axis cardiac cine MR images, enabling follow-on automated LV segmentation algorithms. …”
    Get full text
    Get full text
    Article
  15. 15

    Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation by Anwar, Farhat, Boby, Rounaqul Islam, Rashid, Muhammad Mahbubur, Alam, Md. Monjurul, Shaikh, Z.

    Published 2017
    “…This work proposes an improved framework for FDA system to ensure a robust intelligent network of FDA control panels in real-time. A shortest path algorithmic was chosen for series of buildings connected by fiber optic network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…This is also the advantage of the algorithm since any signal would interfere and subsequently affect the quality of service (QoS) of the IEEE 802.22 connection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a fall detection system based on neural network featuring IoT-Technology by Nik Anwar, Nik Syahrim, Ng, Yong Jie, Ng, Wei Yu, Law, Cheng Quan

    Published 2021
    “…A backpropagation neural network algorithm has been developed to accurately distinguish falls from different postural transitions during activities of daily living (ADL). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Vertical Handover Decision Processes for Fourth Generation Heterogeneous Wireless Networks by Al-Khalid, Hj Othman, Mahmood, Adnan, Hushairi, Zen

    Published 2013
    “…This paper intends to present a comprehensive survey of VHD algorithms designed to satisfy these requirements. To offer a systematic comparison and thus to assess the tradeoffs between their complexity of implementation and efficiency, our study has categorized algorithms into various groups based on the main handover decision criterion used. …”
    Get full text
    Get full text
    Get full text
    Article