Search Results - (( process activation connection algorithm ) OR ( java application during algorithm ))
Search alternatives:
- activation connection »
- connection algorithm »
- process activation »
- application during »
- java application »
- during algorithm »
-
1
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
Get full text
Get full text
Get full text
Article -
2
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
3
New algorithms to minimize handoff latency in AMTree protocol
Published 2009“…AMTree protocol is an active network based protocol that makes sending packets to receivers, after source migration, an efficient process. …”
Get full text
Get full text
Get full text
Article -
4
Improving The Algorithm To Detect Internet Worms
Published 2008“…The principle of this effective algorithm is an improved two rotation process to detect and contain all types of internet worms.…”
Get full text
Get full text
Get full text
Thesis -
5
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…The dataset to perform the algorithm will be retrieved from an open-source website called Kaggle where it will be used for the training and testing process. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
7
ANN-based performance analysis on human activity recognition
Published 2020“…This makes the identifying-process activity (AR) applications and behavior aware of the context. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
ANN-based Performance Analysis on Human Activity Recognition
Published 2020“…This makes the identifying-process activity (AR) applications and behavior aware of the context. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah
Published 2010“…In this study, the optimization algorithm, PSO is chosen and applied in feedforward neural network to enhance the learning process. …”
Get full text
Get full text
Thesis -
10
-
11
Topology control in heterogeneous wireless sensor networks / Nafiseh Ahadi
Published 2011“…Topology control manages connectivity and coverage with the least active node with the goal of extending its lifetime. …”
Get full text
Get full text
Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
-
14
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
15
Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier
Published 2017“…The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
Get full text
Get full text
Get full text
Article -
16
Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim
Published 2019“…The installation of DG requires optimisation process to identify the correct location and sizing. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…Based on the trend shows more activities done during the holiday and the attacking activity also frequently happen during the weekend or public holiday. …”
Get full text
Get full text
Thesis -
20
Modeling Techniques and Stability Analysis Tools for Grid-Connected Converters
Published 2023Article
