Search Results - (( developing implementing connection algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- developing implementing »
- implementing connection »
- connection algorithm »
- java application »
- application tree »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…The performance of Extended Virtual Force-Based Algorithm (EVFA) and Cuckoo Search (CS) algorithm are evaluated and EVFA shows the improvement of coverage area and exhibits a guaranteed connectivity compared to CS algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
6
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…A controlled Cuk DC-DC converter was implemented and connected to a SunTech STP085B PV panel to verify the accuracy of the proposed method. …”
Get full text
Article -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
8
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…Next, the framework of QAPU was designed and developed. For this purpose, some gates and connections were projected in the framework which could be applied for future quantum algorithms. …”
Get full text
Get full text
Thesis -
9
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
10
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…This algorithm is very practical to implement for individuals or for small group communication but unpractical when implemented in a big company where many users can become a bottleneck. …”
Get full text
Get full text
Get full text
Article -
11
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…The initial phase involved the development of the FSSM of the superheater system. In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
Get full text
Get full text
Research Reports -
14
Optimization grid scheduling with priority base and bees algorithm
Published 2014“…The suggested procedure means that a newly developed algorithm can implement the schedule grid task while accounting for priorities and deadlines to decrease the completion time required for the tasks. …”
Get full text
Get full text
Get full text
Thesis -
15
Dual authentication for bluetooth connection
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Article -
16
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Shortest Path Trajectory System Based on Dijkstra Algorithm
Published 2012“…This project includes the modification of main algorithm which has been implemented in the prototype development. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Single stage string inverter for grid connected Photovoltaic system with Modified Perturb and Observe (P&O) Fuzzy Logic Control (FLC)-based MPPT technique
Published 2016“…This paper presents an implementation of Single-phase Single stage String inverter for Grid connected Photovoltaic (PV) system. …”
Get full text
Get full text
Get full text
Article -
19
Hybrid MPPT algorithm for mismatch photovoltaic panel application / Muhammad Iqbal Mohd Zakki
Published 2019“…MATLAB/Simulink is used to develop, test, optimize, and verify the proposed hybrid MPPT algorithm, and PSO-PID tuning method, before embedded in the MPPT system for the hardware implementation as a research product. …”
Get full text
Get full text
Thesis -
20
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The model was developed based on several predefined criteria. The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis
