Search Results - (( developing internet self algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Wireless water quality cloud monitoring system with self-healing algorithm by Syed Ariffin, Sharifah Hafizah, Baharudin, Muhammad Ariff, Mohd Fauzi, Mohd Husaini, Abdul Latiff, Nurul Mu'azzah, Syed Yusof, Sharifah Kamilah, Abdul Latiff, Nurul Adilah

    Published 2017
    “…The self-healing algorithm is design to reduce human intervention and continuous data collected in the remote areas. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur by Abdi Nur, Nur Linda

    Published 2007
    “…The objectives of this project is to develop self-learning environment in learning searching and sorting algorithm, enhance understanding of student in learning searching and sorting technique and to apply web-based learning in computer science subject, which focus on courses that use searching and sorting algorithm.…”
    Get full text
    Get full text
    Thesis
  3. 3

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…With the explosive development of the critical services network systems and Internet, the need for networks security systems have become even critical with the enlargement of information technology in everyday life. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks by A. A Aziz, Azrina, Sekercioglu, Y. Ahmet, Fitzpatrick, Paul, Ivanovich, Milosh

    Published 2013
    “…Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. …”
    Get full text
    Get full text
    Citation Index Journal
  7. 7

    A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES by Ling, Chien

    Published 2020
    “…This study only focuses on three types of clustering techniques which are k-means clustering, agglomerative hierarchical clustering with the ward’s linkage, complete linkage, and average linkage, and Self-Organizing Map (SOM). The clustering algorithms are written using Python language by modifying the coding obtained from the Internet. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…Practically, depending on its purposes, UGVs often equipped with sensors and on-board camera to enable self-navigation in order to achieve the desired mission requisite. the number of devices involved in machine-to-machine communications is expected to steadily grow, thus realizing the envisioned revolution called the Internet of Things (IoT), in which one of the main proclaimed goal is to connect everything and everyone everywhere to everything and everyone else. …”
    Get full text
    Get full text
    Monograph
  9. 9

    IoT Soil Moisture Monitoring and Irrigation System Development by Chew, Kim Mey, Syvester Tan, Chiang Wei, Gary Loh, Chee Wyai, Nancy, Bundan, Yiiong, Siew Ping

    Published 2020
    “…At the same time, with a self-sufficient and self-organized irrigation system based on the water-control algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  10. 10
  11. 11

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…In the past decade, we have witnessed a significant increase in the number of Internet users and technology hunters. With the aid of wireless communications and demand of flexible anytime, anywhere networking, many types of wireless self-organizing networks have already gained huge popularity among users. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Google autocomplete search algorithms and the Arabs' perspectives on gender: a case study of Google Egypt by Al-Abbas, Linda S., Haider, Ahmad S., Hussein, Riyad F.

    Published 2020
    “…Bearing in mind the perpetuating function that technology may have of existing stereotypes and social norms, users and developers of Google alike must pay more attention to gender biases that algorithms may establish and disseminate.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  15. 15

    RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim by Osman, Mohd Nizam, Mohammad Zulrahim, Mohd Syafiq Aiman

    Published 2016
    “…Therefore, everybody can easily connect to the Internet and indirectly exposed to the security issues, especially the safety of the confidential data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…A control mechanism is defined as well to control the non-cooperative behavior and fair-use policy among CMs. Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    SNR-Based OLSR Routing Protocol for Wireless Mesh Networks by Elobaid, Mohamed Elshaikh

    Published 2009
    “…The major advantages of WMNs over the other wireless networks are the low-cost, self organization, self configuration, last mile internet solution, scalability, and reliability. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Therefore, we take this initiative to make enhancement in cyber security application to avoid the Internet users from being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 377$ 3(53867$.$$1781.8781$0,1$+ iii backscatter. …”
    Get full text
    Get full text
    Thesis