Search Results - (( developing implementing connection algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- developing implementing »
- implementing connection »
- connection algorithm »
- application modified »
- java application »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…A controlled Cuk DC-DC converter was implemented and connected to a SunTech STP085B PV panel to verify the accuracy of the proposed method. …”
Get full text
Article -
6
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…Next, the framework of QAPU was designed and developed. For this purpose, some gates and connections were projected in the framework which could be applied for future quantum algorithms. …”
Get full text
Get full text
Thesis -
7
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
9
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…This algorithm is very practical to implement for individuals or for small group communication but unpractical when implemented in a big company where many users can become a bottleneck. …”
Get full text
Get full text
Get full text
Article -
10
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…The initial phase involved the development of the FSSM of the superheater system. In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
Get full text
Get full text
Research Reports -
13
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimization grid scheduling with priority base and bees algorithm
Published 2014“…The suggested procedure means that a newly developed algorithm can implement the schedule grid task while accounting for priorities and deadlines to decrease the completion time required for the tasks. …”
Get full text
Get full text
Get full text
Thesis -
15
Dual authentication for bluetooth connection
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Article -
16
Shortest Path Trajectory System Based on Dijkstra Algorithm
Published 2012“…This project includes the modification of main algorithm which has been implemented in the prototype development. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Single stage string inverter for grid connected Photovoltaic system with Modified Perturb and Observe (P&O) Fuzzy Logic Control (FLC)-based MPPT technique
Published 2016“…This paper presents an implementation of Single-phase Single stage String inverter for Grid connected Photovoltaic (PV) system. …”
Get full text
Get full text
Get full text
Article -
18
Hybrid MPPT algorithm for mismatch photovoltaic panel application / Muhammad Iqbal Mohd Zakki
Published 2019“…MATLAB/Simulink is used to develop, test, optimize, and verify the proposed hybrid MPPT algorithm, and PSO-PID tuning method, before embedded in the MPPT system for the hardware implementation as a research product. …”
Get full text
Get full text
Thesis -
19
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The model was developed based on several predefined criteria. The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis -
20
Development of automatic pest sampling and detection system for cash crops
Published 2019“…The process of insect detection and counting is starting with image acquisition, image preprocessing, and morphological operations. Connected components algorithm was implemented for insect detection and counting. …”
Get full text
Get full text
Thesis
