Search Results - (( knowledge visualization optimization algorithm ) OR ( java a connection algorithm ))
Search alternatives:
- visualization optimization »
- knowledge visualization »
- connection algorithm »
- a connection »
- java a »
-
1
-
2
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
3
Normative Fish Swarm Algorithm For Global Optimization With Applications
Published 2019“…Referred to as Normative Fish Swarm Algorithm (NFSA), the proposed Fish Swarm Algorithm, Optimized by Particle Swarm Optimization with Extended Memory (PSOEM-FSA) is expanded by amalgamating the normative knowledge to provide supplementary guidelines for better global optimum achievement and convergence rate. …”
Get full text
Get full text
Thesis -
4
Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking
Published 2017“…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
Get full text
Get full text
Monograph -
5
A Review on energy consumption optimization techniques in IoT based smart building environments
Published 2019“…The gaps in the literature are due to advancements in technology, the drawbacks of optimization algorithms, and the introduction of new optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
7
A review on energy consumption optimization techniques in IoT based smart building environment
Published 2019“…The gaps in the literature are due to advancements in technology, the drawbacks of optimization algorithms and the introduction of new optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
9
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Dynamic modelling of proton exchange membrane fuel cell system for electric bicycle / Azadeh Kheirandish
Published 2016“…Classical linear regression and artificial neural networks as the most popular and accurate algorithms have been optimized and used for modeling this system. …”
Get full text
Get full text
Thesis -
13
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
Get full text
Get full text
Article -
14
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
15
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
Get full text
Get full text
Get full text
Thesis -
16
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Thesis -
17
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…New Iterative Alternating Group Explicit (NAGE) is a powerful parallel numerical algorithm for multidimensional temperature prediction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…The root growth algorithm has often been used to solve challenging optimization issues. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
20
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
Get full text
Get full text
Thesis
