Search Results - (( developing program drops algorithm ) OR ( java data connection algorithm ))
Search alternatives:
- connection algorithm »
- developing program »
- data connection »
- program drops »
- java »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Congestion management based optimization technique using bee colony
Published 2023“…The study involved the development of bee colony algorithm in addressing congestion management, considering cost optimization as the objective function. …”
Conference Paper -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
5
Simulation of single and dual layered rapid pressure swing adsorption
Published 2013“…A dual layered RPSA model is then developed. Verification of the applied numerical methods and computer programs are carried out successfully that the simulated results agree well with the analytical solutions and experimental data. …”
Get full text
Get full text
Thesis -
6
-
7
Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub...
Published 2014“…In doing so, Multi-Parametric Programming technique is used to develop the computer algorithm; whereas Model-Based Predictive Control (MPC) is adopted for the design of the controller. …”
Get full text
Get full text
Monograph -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
11
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
12
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…Tube B images are needed to evaluate the performance of the developed defect detection algorithm under different radiography conditions. …”
Get full text
Monograph -
13
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…In realizing this concept, we consider the advantages of data passing between two web services which each are connected with one or multiple set of clusters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
15
-
16
Automatic mapping of concrete strength in structural element
Published 2006“…The mapping process is done automatically in computer-generated program. Signal-processing techniques were used to compute the data; Fourier Transform to translate a time-series signal into frequency domain, concrete strength calculation, interpolation technique and a Graphic User Interface (GUI) to complete the mapping algorithms.…”
Get full text
Get full text
Conference or Workshop Item -
17
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
