Search Results - (( developing users connection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- connection algorithm »
- developing users »
- users connection »
- java application »
- using algorithm »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The main objectives for this project are focusing on the development of user interface that can connect with the machine learning build in Microsoft Azure for pump diagnostic purpose. …”
Get full text
Get full text
Monograph -
2
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Network monopoly / Tan Kean Yeap
Published 2002“…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
Get full text
Get full text
Thesis -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
7
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Moreover, UOCC system has been extended to online environment via Wi-Fi which utilizes Transmission Control Protocol (TCP) Socket in Java which used the PC as server to create socket thus establishing bind connection between UOCC RM mobile phone and the UOCC system, allowing users to remotely monitor the machining process on mobile platform. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Second Level Password Generator
Published 2010“…Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. …”
Get full text
Get full text
Conference or Workshop Item -
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
-
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
UiTM Malaysia route planner / Mohamad Yunus Mohamed Nasir
Published 2008“…The objectives of this research/project are to provide information and guidance for users to find shortest path from familiar point or places to main entrance UiTM Malaysia by using car, to provide an approximation of the shortest distance between source and destination using Dijkstra's algorithm and to develop web based system UiTM Malaysia Route Planner for users who is familiar in Shah Alam.…”
Get full text
Get full text
Thesis -
14
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…Moreover, navigation pattern mining has been done by finding connected components in the graph. In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
Get full text
Get full text
Thesis -
15
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
Get full text
Get full text
Article -
16
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
17
Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi
Published 2025“…First, a greedy-based user association algorithm is proposed to allocate multiple users to MBS or SBSs to maximize the total sum rate. …”
Get full text
Get full text
Get full text
Thesis -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The developed scheduling algorithm is accomplished in three methodological stages as follows: first, frequency domain was considered for efficient scheduling at Resource Blocks (RBs) to the users based on best Channel Quality Indicator (CQI) report send from mobile station called as User Equipment (UE) to the base station (eNodeB). …”
Get full text
Get full text
Get full text
Thesis
