Search Results - (( process activation connection algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    New algorithms to minimize handoff latency in AMTree protocol by Al-Sharafi, Ali, Othman, Mohamed, K. Subramaniam, Shamala

    Published 2009
    “…AMTree protocol is an active network based protocol that makes sending packets to receivers, after source migration, an efficient process. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Improving The Algorithm To Detect Internet Worms by Rasheed, Mohmmad M

    Published 2008
    “…The principle of this effective algorithm is an improved two rotation process to detect and contain all types of internet worms.…”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…The dataset to perform the algorithm will be retrieved from an open-source website called Kaggle where it will be used for the training and testing process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
    Get full text
    Get full text
    Article
  7. 7

    ANN-based performance analysis on human activity recognition by Elzein, Nahla Mohammed, Fakherldin, Mohammed, Abaker, Ibrahim, Mazlina, Abdul Majid

    Published 2020
    “…This makes the identifying-process activity (AR) applications and behavior aware of the context. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    ANN-based Performance Analysis on Human Activity Recognition by Elzein, Nahla Mohammed, Fakherldin, Mohammed, Abaker, Ibrahim, Mazlina, Abdul Majid

    Published 2020
    “…This makes the identifying-process activity (AR) applications and behavior aware of the context. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah by Abdullah, Muhamad Faizol Adli

    Published 2010
    “…In this study, the optimization algorithm, PSO is chosen and applied in feedforward neural network to enhance the learning process. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Topology control in heterogeneous wireless sensor networks / Nafiseh Ahadi by Ahadi, Nafiseh

    Published 2011
    “…Topology control manages connectivity and coverage with the least active node with the goal of extending its lifetime. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13
  14. 14

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…First we propose two algorithms to improve the handoff process in AMTree protocol. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier by Hassan, Raini, Taha Alshaikhli, Imad Fakhri, Ahmad, Salmiah

    Published 2017
    “…The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim by Abdul Rahim, Siti Rafidah

    Published 2019
    “…The installation of DG requires optimisation process to identify the correct location and sizing. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak by Ishak, Rusmawati

    Published 2018
    “…Based on the trend shows more activities done during the holiday and the attacking activity also frequently happen during the weekend or public holiday. …”
    Get full text
    Get full text
    Thesis
  20. 20