Search Results - (( development data connection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Wireless water quality cloud monitoring system with self-healing algorithm by Syed Ariffin, Sharifah Hafizah, Baharudin, Muhammad Ariff, Mohd Fauzi, Mohd Husaini, Abdul Latiff, Nurul Mu'azzah, Syed Yusof, Sharifah Kamilah, Abdul Latiff, Nurul Adilah

    Published 2017
    “…The self-healing algorithm is design to reduce human intervention and continuous data collected in the remote areas. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus by Megat Yunus, Puteri Nor Ashikin

    Published 2023
    “…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…To evaluate the effectiveness of the algorithm, simulation case studies have been conducted with actual load data and actual PV generation data. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
    Get full text
    Get full text
    Article
  14. 14

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…The enhancement reaped from the developed selection algorithm is expected to bring benefit to different user at various places…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Coverage and connectivity maximization for wireless sensor networks using improved chaotic grey wolf optimization by Shaikh, Muhammad Suhail, Wang, Chang, Xie, Senlin, Zheng, Gengzhong, Dong, Xiaoqing, Qiu, Shuwei, Mohd Ashraf, Ahmad, Raj, Saurav

    Published 2025
    “…Efficient network coverage and connectivity in wireless sensor networks (WSNs) is critical for modern data-driven applications requiring seamless data collection and transmission. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks by Alrshah, Mohamed Alhadi Mahmoud, Al-Moqri, Mohamed A., Othman, Mohamed

    Published 2019
    “…In the last decade, the demand for Internet applications has been increased, which increases the number of data centers across the world. These data centers are usually connected to each other using long-distance and high-speed networks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
    Get full text
    Get full text
    Get full text
    Thesis