Search Results - (( policy implementation sensor algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  3. 3

    Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.] by Haron, Muhammad Adib, Jusoh, Mohamad Huzaimy, Abdul Aziz, Noor Hafizah, W. Muhamad, Wan Norsyafizan

    Published 2008
    “…This scheme will be deployed by combining the interference temperature multiple accesses (lTMA) on top of existing slotted/unslotted CSMAICA. To implement WSN integrated with cognitive radio techno 10gy, a new algorithm that provides access mechanism is needed to interactively working with sensor nodes hardware. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network by Aitizaz Ali, Mohammed Amin Almaiah, Fahima Hajjej, Muhammad Fermi Pasha, Ong Huey Fang, Rahim Khan, Jason Teo, Muhammad Zakarya

    Published 2022
    “…To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article