Search Results - (( development process normalization algorithm ) OR ( java using connection algorithm ))

Refine Results
  1. 1

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Text normalization algorithm for facebook chats in Hausa language by Jaafar, Zubairu Maitama, Haruna, Usman, Gambo, Abdullahi Ya'u, Thomas, Bimba Andrew, Idris, Norisma, Ya’u Gital, Abdulsalam, Abubakar, Adamu

    Published 2014
    “…The proposed algorithm manually developed dictionary that employ normalization of each non-standard word with its equivalent standard word. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Application of Technology Acceptance Model on Database Normalizer by Al-Absi, Ahmed Abdulhakim Ahmed

    Published 2011
    “…The main objective of this study is to develop a database normalizer application to normalize the database tables up to the third normal form (3NF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The programming language that is used to write the program is Java Language.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Taguchi?s T-method with Normalization-Based Binary Bat Algorithm by Marlan Z.M., Jamaludin K.R., Harudin N.

    Published 2025
    “…An experimental study was conducted, and the variable selection process using the normalization-based Binary Bat algorithm found a better combination of input variables which consists of only six out of eight variables. …”
    Conference paper
  13. 13

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…Many researchers have developed many new and sophisticated methods. They show complicated computation and algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Article
  17. 17

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images by Chong, Bei Wei

    Published 2015
    “…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. As an extension to the scheme for enabling users to authenticate to the IIoT connected devices while Internet access is unavailable, a new offline multi-factor authentication scheme for the automotive industry is proposed. …”
    Get full text
    Get full text
    Thesis
  20. 20