Search Results - (( development issues connection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This random deployment causes issues such as coverage hole, overlapping and connectivity failure that contributes to the performance of coverage and connectivity of WSN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Before incorporating the optimization methods, a sizing algorithm for large-scale GCPV systems was developed. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…One major issue arose in 80s when routers got congested and the connections collapsed because they were pushed to their limits by the competing robots for connection. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Thus, there is a room for further enhancement to develop a routing algorithm as to mitigate the drawbacks with the NCPR. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In this paper we will explore the developments of some of the important routing algorithms, and a survey with different comparisons, those have been proposed for the partially connected underwater environments. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Four algorithms have been proposed and developed in this research. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization grid scheduling with priority base and bees algorithm by Ahmed, Mohammed Shihab

    Published 2014
    “…The suggested procedure means that a newly developed algorithm can implement the schedule grid task while accounting for priorities and deadlines to decrease the completion time required for the tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…It can also ensure an economic and environment friendly system where the existing algorithms are limited to serve these. The proposed algorithm can mitigate the available power issues for hybrid PV-BESS connected system and it can also minimize the operating cost by dispatching the generation units optimally. …”
    Get full text
    Get full text
    Article
  14. 14

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…The process of insect detection and counting is starting with image acquisition, image preprocessing, and morphological operations. Connected components algorithm was implemented for insect detection and counting. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Technical report: an application of graph theory in place a sensor at traffic light / Nur Shamimi Saleh Huddin, Nurul Nadiah Abd Ghani and Wan Nur Hafawati Wan Hassan by Saleh Huddin, Nur Shamimi, Abd Ghani, Nurul Nadiah, Wan Hassan, Wan Nur Hafawati

    Published 2016
    “…In this study, the basic application of Graph Theory for Traffic Control is used to develop the compatibility graph, find the minimal edge set and draw the connectivity graph. …”
    Get full text
    Get full text
    Student Project