Search Results - (( processes activation connection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- activation connection »
- processes activation »
- connection algorithm »
- java application »
-
1
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
Get full text
Get full text
Get full text
Article -
2
New algorithms to minimize handoff latency in AMTree protocol
Published 2009“…AMTree protocol is an active network based protocol that makes sending packets to receivers, after source migration, an efficient process. …”
Get full text
Get full text
Get full text
Article -
3
Improving The Algorithm To Detect Internet Worms
Published 2008“…The principle of this effective algorithm is an improved two rotation process to detect and contain all types of internet worms.…”
Get full text
Get full text
Get full text
Thesis -
4
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…The dataset to perform the algorithm will be retrieved from an open-source website called Kaggle where it will be used for the training and testing process. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
ANN-based performance analysis on human activity recognition
Published 2020“…This makes the identifying-process activity (AR) applications and behavior aware of the context. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
ANN-based Performance Analysis on Human Activity Recognition
Published 2020“…This makes the identifying-process activity (AR) applications and behavior aware of the context. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah
Published 2010“…In this study, the optimization algorithm, PSO is chosen and applied in feedforward neural network to enhance the learning process. …”
Get full text
Get full text
Thesis -
10
-
11
Topology control in heterogeneous wireless sensor networks / Nafiseh Ahadi
Published 2011“…Topology control manages connectivity and coverage with the least active node with the goal of extending its lifetime. …”
Get full text
Get full text
Thesis -
12
-
13
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
14
Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier
Published 2017“…The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
Get full text
Get full text
Get full text
Article -
15
Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim
Published 2019“…The installation of DG requires optimisation process to identify the correct location and sizing. …”
Get full text
Get full text
Thesis -
16
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…Based on the trend shows more activities done during the holiday and the attacking activity also frequently happen during the weekend or public holiday. …”
Get full text
Get full text
Thesis -
17
Modeling Techniques and Stability Analysis Tools for Grid-Connected Converters
Published 2023Article -
18
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…It will determine the path based on a cost,in which the decision will be made depending on the lowest cost between several connected paths. By using the MATLAB simulation tool,the performance of SPF algorithm and conventional method will be evaluated. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Single fitness function analysis of energy-consumption and radio bandwidth management in coverage area problems
Published 2024thesis::master thesis -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
