Search Results - (( java interactive data algorithm ) OR ( program implementation connection algorithm ))

Refine Results
  1. 1

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…Each web services are easily maintainable since there is loose coupling between interacting nodes. The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…Java program has been used to test the performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    EasyA: Easy and effective way to generate pairwise test data by Rabbi, Khandakar Fazley, Sabira, Khatun, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2013
    “…Java program has been used to test the performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior by Abidin H.Z., Din N.M., Radzi N.A.M.

    Published 2023
    “…The main objectives considered in this paper are to achieve maximum coverage and minimum energy consumption with guaranteed connectivity. A simulation study has been carried out to compare the performance of the proposed algorithm implemented in two different single objective approaches with an Integer Linear Programming based algorithm and another biological inspired algorithm. …”
    Article
  5. 5

    Control algorithm for two-tank system using multiparametric programming by Zakaria, A., Mid, E.C., Mohamed, M.F., Hussin, M.H.M., Shaari, A.S., Ruslan, Eliyana, Hadi, Dayanasari, Masri, M.

    Published 2023
    “…In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…In order to achieve this objective, each node must be connected in its shortest way as possible. We start our algorithm by designing shortest path algorithm based on Dijkstra's method. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The system architecture which consists of a user interface, web framework and storage data. D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.] by Ismail, Razidah, Ahmad, Tahir, Harish, Noor Ainy, A. Halim, Rosenah

    Published 2011
    “…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    Design And Development Of Gas Argon Purging System by Ooi, Seng Yeong

    Published 2006
    “…AMPL is used in two ways of connection of its programming, first is Data Base, and second is PC element. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  13. 13

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…In this dissertation a mobile cloud will be under consideration when designing the prototype, it is proven that mobile processors are tiny processors and could only handle a limited resources, thus the ability of making the applications processes in server, leaving the mobile clients a small part of only accessing data and interact with it. Such methodology can be achieved by java programming language for mobile clients J2ME, and by using a second generation mobile phones. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…The templates are programmed in MATLAB. There are few rules in Cellular Neural Network that has to be implemented when programming the templates, such as the state equation, output equation, boundary condition and also the initial value. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems by Ismail, Razidah

    Published 2005
    “…To facilitate the implementation of these algorithms, a semi-automated computational tool using Matlab® programming facilities is developed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc-dc converter by Mohd Zainuri, Muhammad Ammirrul Atiqi, Mohd Radzi, Mohd Amran, Che Soh, Azura, Abd Rahim, Nasrudin

    Published 2014
    “…For hardware implementation, the proposed adaptive P&O-fuzzy control MPPT was programmed in TMS320F28335 digital signal processing board. …”
    Get full text
    Get full text
    Article
  19. 19

    Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations by Mohd Zainuri, M.A.A., Radzi, M.A.M., Soh, A.C., Mariun, N., Rahim, N.A.

    Published 2016
    “…For hardware implementation, laboratory prototype has been developed and the proposed algorithm was programmed in TMS320F28335 DSP board. …”
    Get full text
    Get full text
    Article
  20. 20

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis