Search Results - (( programming model protocol algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8

    Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad by Mahamad, Laina Sofia

    Published 2017
    “…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…In this thesis, a user authentication program is modeled and simulated using Network simulator2 (NS2). …”
    Get full text
    Get full text
    Thesis
  10. 10

    A protocol for developing a classification system of mosquitoes using transfer learning by Pradeep Isawasan, Zetty Ilham Abdullah, Ong, Song Quan, Khairulliza Ahmad Salleh

    Published 2022
    “…This protocol target on the domain expert such as entomologist and public health practices to develop their own model to solve the task of mosquito/insect classification.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…After embedding the presented solution, a new protocol is created and applied. Thus, the new protocol is available to the communicating packets across all computer networks. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  13. 13

    A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus by Megat Yunus, Puteri Nor Ashikin

    Published 2023
    “…Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin by Shamsuddin, Shuhaimi

    Published 2003
    “…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. Serial asynchronous transmission was used as data communication protocol via RS232 port. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan by Jahangir , Hassan Khan

    Published 2019
    “…The sensor node will transfer data to a computer via Wi-Fi using a custom designed network protocol. A multi-threaded program running on the computer will perform Forward Kinematics on the wirelessly transferred data using an arm model created using the Denavit-Hartenberg convention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors by Pathan, Al-Sakib Khan, Ahmed, Tarem

    Published 2014
    “…Wireless sensor networks (WSN) are emerging as both an important new tier in the IT (information technology) ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security, and social factors [1,2]. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    Recent advancement of energy internet for emerging energy management technologies: Key features, potential applications, methods and open issues by Hannan M.A., Ker P.J., Mansor M., Lipu M.H., Al-Shetwi A.Q., Alghamdi S.M., Begum R.A., Tiong S.K.

    Published 2024
    “…This article also explains the energy internet methods related to different programming approaches, artificial intelligence, and optimization algorithms for achieving granted reliability and enabling a decentralized energy market with a two-way energy flow. …”
    Review