Search Results - (( java implication based algorithm ) OR ( programming users connection algorithm ))

Refine Results
  1. 1
  2. 2

    Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…The action module will cover GPS, GSM, GPRS and camera triggering and interfacing, controlled by an algorithm programmed to suitable microcontroller platform. …”
    Get full text
    Get full text
    Article
  3. 3

    Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…The action module will cover GPS, GSM, GPRS and camera triggering and interfacing, controlled by an algorithm programmed to suitable microcontroller platform. …”
    Get full text
    Get full text
    Thesis
  4. 4

    OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH by NUR AFIQAH, JAHILAN

    Published 2022
    “…PV technology comprises the grid-connected PV systems and off-grid PV systems. Off-grid PV systems generate and distribute electrical energy independently, unlike the grid-connected PV systems. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Resource allocation techniques for downlink Non-Orthogonal Multiple Access-Based 5G wireless systems by Ali, Zuhura Juma

    Published 2021
    “…The results show that the femtocell user’s minimum energy efficiency by applying NOMA with power allocation method using Sequential Convex Programming and user pairing based on Greedy Algorithm (NOMA-SCP-GA) is higher by 38.22 %, 58.84 %, and 76.39 % compared to NOMA-DC, NOMA-FTPA, and OFDMA methods respectively. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.] by Ismail, Razidah, Ahmad, Tahir, Harish, Noor Ainy, A. Halim, Rosenah

    Published 2011
    “…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat by Fatima, Jannat

    Published 2022
    “…The result implies a good connection between how a novice programmer goes through a programming problem and his/her emotional arousal at that moment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Helperconnect / Leviana Andrew ... [et al.] by Andrew, Leviana, Mat Yusof, Marlita, Wan Ibrahim, Wan Muhd Faez, Hassan, Siti Salwa, Haris, Nurfazlina

    Published 2024
    “…By utilizing a robust matching algorithm, users can find assistance tailored to their specific needs. …”
    Get full text
    Get full text
    Book Section
  11. 11

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…The enhancement reaped from the developed selection algorithm is expected to bring benefit to different user at various places…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…It advantages is include the speed of connection setup, and ease of removal of services or users. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin by Hussin, Ain Amirah

    Published 2016
    “…This project have achieve three objectives which are to design mobile based program that allows user to play the control car using the smart phone, to develop a program that connects the car over Bluetooth system and to test the functionality of the prototype. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The users of the IIoT connected devices should be able to authenticate and communicate even when the Internet connections are intermittent and not available. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset by Chiang, Yi Fan

    Published 2017
    “…The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
    Get full text
    Get full text
    Monograph
  19. 19

    ECONOMICAL OPTIMIZATION OF CONDUCTOR SELECTION IN PLANNING RADIAL DISTRIBUTION NETWORKS by Ab Ghani, Mohd Ruddin

    Published 1999
    “…A new computer algorithm and program is presented for selection of optimal conductor type and size for each feeder segment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Economical optimization of conductor selection in planning radial distribution networks by Islam, S.J., Ghani, M.R.A.

    Published 1999
    “…A new computer algorithm and program is presented for selection of optimal conductor type and size for each feeder segment. …”
    Get full text
    Get full text
    Article