Search Results - (( java application optimisation algorithm ) OR ( using action protocol algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    System design for urban vehicle two-way connection monitoring system / Muhammad Haiqal Amiruddin by Amiruddin, Muhammad Haiqal

    Published 2015
    “…Meanwhile the communication module will communicate between the sensing module and the action module based on two approaches: SMS protocol and TCP/IP protocol. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Optimization of process allocation causes to decrease the network traffic and fairer allocation, and therefore,optimization of fault-tolerance. The new protocol is simulated with using the OPNET and the MATLAB software. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
    text::Thesis
  9. 9
  10. 10

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Dynamic Traffic-Light Phase Plan Protocol (DT3P) by Abbas, Maythem K., Karsiti , Mohd Noh, Napiah, Madzlan, Samir, B. B.

    Published 2011
    “…We are proposing a system design with its protocol and set of algorithms to help balancing the road traffic load and make the driving on highways and urban cities roads more comfort. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Brain Machine Interface Controlled Robot Chair by Hema Chengalvarayan, Radhakrishnamurthy

    Published 2010
    “…The BMI controls the joystick of the robot chair using a shared control algorithm. Real-time experiments are also presented using 10 trained and 5 untrained subjects to validate the applicability of the brain machine interface. …”
    Get full text
    Thesis
  15. 15

    Traffic Light Control via VANET System Architecture by Brahim Belhaouari Samir, BBS, Mohammad Noh K., MNL

    Published 2011
    “…We are proposing a system design with its protocol and set of algorithms to help balancing the road traffic load and make the driving on highways and urban cities roads more comfort. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Improving the security of mobile IPV6 signalling using KECCAK / SHA-3 by Supriyanto Praptodiyono, Teguh Firmansyah, Raja Kumar Murugesan, Mudrik Alaydrus, Randy Aprilia, Leau, Yu-Beng

    Published 2021
    “…The conventional IPsec uses Keyed-Hash Message Authentication Code-Secure Hash Algorithm-1 (HMAC-SHA-1) to authenticate signalling messages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20