Search Results - (( development communication calling algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Extended from the FastZ algorithms, another three new algorithms called the FastRLP, BRLP and FastBRLP algorithms are developed to achieve different performance goals. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of eCall for Malaysia's automotive industries by Abd Musthalib, Mohd Aliff, Mansor, Hasmah, Zainal Abidin, Zulkifli

    Published 2019
    “…As such, collision detection and voice communication algorithm has been designed. For the collision detection, algorithm has been developed based on the data acquired from gyroscope and accelerometer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…Secondly, the proposed call admission control algorithm improved the resource utilization algorithm thus reducing the call block, call dropped, call degradation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Reducing Iteration Using Candidate List by Md Rais, Helmi, Ali Othman, Zulaiha, Hamdan, Abdul Razak

    Published 2008
    “…The principle of cooperation and the behavior of a single ant finding path has been the backbone in this algorithmic development. Ants communicate to each other through a chemical substance called pheromone. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria by Zakaria, Ahmad Zulkhair

    Published 2006
    “…A reliable and fast communication is really crucial nowadays to support the rapid development of technologies. …”
    Get full text
    Get full text
    Student Project
  13. 13

    A review of electric vehicle charging management based on the communication between EV, RSU and CS by Mohammed D., Mansor M.B., Hock G.C.

    Published 2024
    “…Electric vehicles (EV) equipped with communication devices and wireless sensors such as an onboard unit (OBU) allow wireless communication between electric vehicles (EV) and roadside units (RSU) called V2I and between electric vehicles and smart grid components such as charging stations (CS) called V2G. …”
    Conference Paper
  14. 14

    Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel by Hushairi, Zen, Al-Khalid, Hj Othman, Khairuddin, Abdul Hamid, Jamaah, Suut

    Published 2020
    “…The excessive delay due to the complexity of the decoding process at the relay node results in additional delays at the destination which is a significant issue in cooperative communication channels. A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    An approximation approach for free space wave propagation by Hasan, Mohammad Khatim, Sulaiman, Jumat, Othman, Mohamed

    Published 2009
    “…Wireless communication technology has increase the need of “soft” tools to facilitate research and development in the area. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Variable Global Optimization min-sum (VGOMS) algorithm of decodeand-forward protocol for the relay node in the cooperative channel by Hushairi, Zen, Jamaah, Suut, Al-Khalid, Bin Hj Othman, Khairuddin, Bin Ab Hamid

    Published 2019
    “…The excessive delay due to the complexity of the decoding process at the relay node results in additional delays at the destination which is a significant issue in cooperative communication channels. A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…The aim of doing this research is to solve problem of anonymous tracker called as virtual communicates. The problem facing on how to track people with anonymous involve matters of legal issues and cyber crime. …”
    Get full text
    Get full text
    Thesis