Search Results - (( developing internet self algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing internet »
- implication based »
- java implication »
- self algorithm »
- internet self »
-
1
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…The self-healing algorithm is design to reduce human intervention and continuous data collected in the remote areas. …”
Get full text
Get full text
Conference or Workshop Item -
2
Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur
Published 2007“…The objectives of this project is to develop self-learning environment in learning searching and sorting algorithm, enhance understanding of student in learning searching and sorting technique and to apply web-based learning in computer science subject, which focus on courses that use searching and sorting algorithm.…”
Get full text
Get full text
Thesis -
3
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…With the explosive development of the critical services network systems and Internet, the need for networks security systems have become even critical with the enlargement of information technology in everyday life. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks
Published 2013“…Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. …”
Get full text
Get full text
Citation Index Journal -
7
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…This study only focuses on three types of clustering techniques which are k-means clustering, agglomerative hierarchical clustering with the ward’s linkage, complete linkage, and average linkage, and Self-Organizing Map (SOM). The clustering algorithms are written using Python language by modifying the coding obtained from the Internet. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…Practically, depending on its purposes, UGVs often equipped with sensors and on-board camera to enable self-navigation in order to achieve the desired mission requisite. the number of devices involved in machine-to-machine communications is expected to steadily grow, thus realizing the envisioned revolution called the Internet of Things (IoT), in which one of the main proclaimed goal is to connect everything and everyone everywhere to everything and everyone else. …”
Get full text
Get full text
Monograph -
9
IoT Soil Moisture Monitoring and Irrigation System Development
Published 2020“…At the same time, with a self-sufficient and self-organized irrigation system based on the water-control algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
Multi-dimensional networking and distributed computing services
Published 2012“…In the past decade, we have witnessed a significant increase in the number of Internet users and technology hunters. With the aid of wireless communications and demand of flexible anytime, anywhere networking, many types of wireless self-organizing networks have already gained huge popularity among users. …”
Get full text
Get full text
Get full text
Article -
12
Google autocomplete search algorithms and the Arabs' perspectives on gender: a case study of Google Egypt
Published 2020“…Bearing in mind the perpetuating function that technology may have of existing stereotypes and social norms, users and developers of Google alike must pay more attention to gender biases that algorithms may establish and disseminate.…”
Get full text
Get full text
Get full text
Article -
13
Direct approach for mining association rules from structured XML data
Published 2012“…The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
Get full text
Get full text
Thesis -
14
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
15
RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim
Published 2016“…Therefore, everybody can easily connect to the Internet and indirectly exposed to the security issues, especially the safety of the confidential data. …”
Get full text
Get full text
Get full text
Article -
16
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
17
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…A control mechanism is defined as well to control the non-cooperative behavior and fair-use policy among CMs. Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
Get full text
Get full text
Get full text
Thesis -
18
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…The major advantages of WMNs over the other wireless networks are the low-cost, self organization, self configuration, last mile internet solution, scalability, and reliability. …”
Get full text
Get full text
Thesis -
19
-
20
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Therefore, we take this initiative to make enhancement in cyber security application to avoid the Internet users from being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 377$ 3(53867$.$$1781.8781$0,1$+ iii backscatter. …”
Get full text
Get full text
Thesis
