Search Results - (( program linux based algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- program linux »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012“…Through this algorithm, each access point (AP) that adjacent will be given different channels based on colours available. …”
Get full text
Get full text
Conference or Workshop Item -
3
An improved algorithm for channel allocation on direct sequence spread spectrum
Published 2011“…Graph coloring is a useful algorithm for channel allocation on Direct Sequence Spread Spectrum (DSSS).Through this algorithm,each access point (AP) that adjacent gives different channels based on colors available.Welsh Powell algorithm and Degree of saturation (Dsatur) are the popular algorithms being used for channel allocation in this domain. …”
Get full text
Get full text
Thesis -
4
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
5
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
6
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…The new technique takes into account internet connection speed in contrast to the classic approach that solely based on the Received Signal Strength (RSS). A heuristic selection model was developed namely Evaluative AP Selection which used LINUX Bash script programming whilst the internet connection speed test was ran by means of PHP script. …”
Get full text
Get full text
Get full text
Article -
7
Class attendance management system using face recognition
Published 2018“…By facing the camera, the camera will capture the image then pass it to the Raspberry Pi which is programmed to handle the face recognition by implementing the Local Binary Patterns algorithm LBPs. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
-
10
-
11
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
12
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
13
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
