Search Results - (( java application server algorithm ) OR ( basic identification system algorithm ))
Search alternatives:
- identification system »
- basic identification »
- application server »
- java application »
- server algorithm »
- system algorithm »
-
1
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
2
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Basically, subspace identifications are based on algorithms from numerical algebras which are the QR decomposition and Singular Value Decomposition (SVD). …”
Get full text
Get full text
Get full text
Article -
3
-
4
Adaptive Linear System Identification over Simulated Wireless Environment
Published 2009“…Wireless technologies have become one of the basic industrial pillars, whereas system identification represents an important tool in many practical engineering circumstances and thus sooner or later both wireless technologies and system identification should be linked together in sense of having an identifier that is able to reliably identify a system over wireless links. …”
Get full text
Get full text
Thesis -
5
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
7
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
8
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
9
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
13
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
14
Hazard identification on fractionation column using rule based expert system
Published 2001“…The algorithm is found applicable for any of process system, however the expert system developed is only limited to the application for fractionation column of oleo chemical plant.…”
Get full text
Get full text
Article -
15
Model Identification Using Neuro-Fuzzy Approach
Published 2018“…In Sect. 3.3, basic theory of neural networks and fuzzy systems are elaborated. …”
Get full text
Get full text
Article -
16
Model Identification Using Neuro-Fuzzy Approach
Published 2018“…In Sect. 3.3, basic theory of neural networks and fuzzy systems are elaborated. …”
Get full text
Get full text
Article -
17
Simultaneous Computation of Model Order and Parameter Estimation of a Heating System Based on Gravitational Search Algorithm for Autoregressive with Exogenous Inputs
Published 2015“…System identification is a class of control system engineering that determines physical functionality of a plant and represents them in the form of mathematical expression by utilizing real experimental data. …”
Get full text
Get full text
Get full text
Article -
18
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The plugin can be 'installed' on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. …”
Get full text
Get full text
Conference or Workshop Item -
19
Peer to Peer Video Streaming Application
Published 2008Get full text
Get full text
Final Year Project -
20
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…Among the widely used technology in recent years is Radio Frequency Identification (RFID). It is an advanced Auto-ID wireless network based configuration system used for identification and tracking of items movement data. …”
Get full text
Get full text
Get full text
Thesis
