Search Results - (( process implementation connection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…This network is both symmetric and regular; thus, make it very beneficial in the implementation process. The main objective is to maximize the number of established connection between nodes in this SD-Torus network. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Quantum Processing Framework And Hybrid Algorithms For Routing Problems by Soltan Aghaei, Mohammad Reza

    Published 2010
    “…A typical component in QPU is a quantum device that runs quantum algorithms; namely Quantum Algorithm Processing Unit (QAPU). …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Enhancement of parallel thinning algorithm for handwritten characters using neural network by Engkamat, Adeline

    Published 2005
    “…Thus, this project presents a framework for the implementation of a multilayer perceptron neural network with backpropagation algorithm, in the Parker thinning algorithm in order to produce a fast fully parallel thinning algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…The project’s purpose is to enhance the tracking method of garments’ quantity by implementing image processing in the mobile application. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2018
    “…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
    Get full text
    Get full text
    Article
  12. 12

    Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2018
    “…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…Connected components algorithm was implemented for insect detection and counting. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The development and implementation of the proposed technique was involved the process of modifying the standard GA so that it is good and specific enough to tackle this network intrusion problem effectively. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fuzzy logic-based intelligent scheme for enhancing QoS of vertical handover decision in vehicular ad-hoc networks by Azzali, Fazli, Ghazali, Osman, Omar, Mohd Hasbullah

    Published 2017
    “…In the next generation network, vertical handover can be started based on the user’s convenience or choice rather than connectivity reasons. This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  20. 20

    Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb by Riyaz Ahamed , Ariyaluran Habeeb

    Published 2019
    “…However, critical reviews have identified that the existing approaches are inefficient in processing data to detect anomalies due to the amassment of massive volumes of data through the connected devices. …”
    Get full text
    Get full text
    Get full text
    Thesis