Search Results - (( java application customization algorithm ) OR ( using ad process algorithm ))
Search alternatives:
- customization algorithm »
- process algorithm »
- java application »
- ad process »
- using ad »
-
1
Enhancement of stemming process for malay illicit web content
Published 2012“…These new features were added in enhanced stemming algorithm.In order to check the effectiveness of the new features added in the enhanced stemming algorithm, few tests were done to the sample of web pages. …”
Get full text
Get full text
Thesis -
2
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
Published 2012“…It also describes the design of a novel on-demand routing algorithm. Most of the proposed algorithms use a blind ooding technique during the route discovery process. …”
Get full text
Get full text
Article -
3
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
Get full text
Get full text
Get full text
Thesis -
4
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…Clustering is used to reduce connection load and eliminate the routing traffic that occurs during the discovery route process. …”
Get full text
Get full text
Thesis -
5
Adaptive path finding algorithm in dynamic environment for warehouse robot
Published 2020“…This paper presents AD* algorithm, a path finding algorithm that works in dynamic environment for warehouse robot. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced dynamic source routing (En-Dsr) with QOS based routing for IPV6 in ad Hoc Networks
Published 2013“…Without any centralized management system, mobile nodes use routing algorithm to perform the routing process from finding a route to sending data to their recipients. …”
Get full text
Get full text
Thesis -
7
-
8
A DC motor controller using PID algorithm implementation on PIC
Published 2008“…In this project, the PID algorithm that is added to the system becomes a closed loop system. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
11
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
12
Fuzzy logic-based intelligent scheme for enhancing QoS of vertical handover decision in vehicular ad-hoc networks
Published 2017“…This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). …”
Get full text
Get full text
Get full text
Article -
13
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
14
Real time algorithm for the portable recording of fetal and maternal heart rates
Published 2023Conference paper -
15
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…Wireless network simulation is used to demonstrate and assess the implementation of network coding in wireless ad hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
16
DEVELOPMENT OF A MULTI-OBJECTIVE OPTIMZATION FRAMEWORK FOR INDUSTRIAL PROCESSES
Published 2014“…The proposed framework is introduced as the 'surgery framework (SF)' since its prime functionality is to dissect the algorithm and add certain mechanisms into it. The SF introduced here comprises of the measuring the solutions of multiple algorithms as well as modifying them by adding certain mechanisms into chosen algorithms.…”
Get full text
Get full text
Thesis -
17
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…This research identifies a process to measure the ASE values using ADS-B data. …”
Get full text
Get full text
Get full text
Thesis -
18
Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm
Published 2003“…The chain code algorithm is used to find these entities. The paper also explains explicit thinning process involved before the chain code methodology. …”
Get full text
Get full text
Get full text
Article -
19
IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE
Published 2006“…Since filter is the important component in adaptive filtering process, the filter is designed first before adding adaptive algorithm. …”
Get full text
Get full text
Final Year Project -
20
Outdoor User Location over 802.11 Ad-hoc Network
Published 2006Get full text
Get full text
Final Year Project
