Search Results - (( variable data connection algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Resource Efficient For Hybrid Fiber-Wireless Communications Links In Access Networks With Multi Response Optimization Algorithm by Wong, Adam Yoon Khang, Indra, Win Adiyansyah, Jamil Alsayaydeh, Jamil Abedalrahim, Mohamat Gani, Johar Akbar, M. Idrus, Sevia, Pusppanathan, Jaysuman

    Published 2021
    “…Mobile Ad-hoc Network (MANET) is currently popular at demand as a solution in numerous deployments that cover from the combat zone to the user’s parlor due to its quickly deployable with adaptive topology and able to function without any infrastructure. However, variable topology is one of the key challenges since the network throughput and energy consumption depends on number of possible connections. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review by Ibrahim, Buhari, Suppiah, Subapriya, Ibrahim, Normala, Mohamad, Mazlyfarina, Abu Hassan, Hasyma, Syed Nasser, Nisha, Saripan, M. Iqbal

    Published 2021
    “…Nevertheless, various concerns over the homogeneity of data based on patient selection, scanner effects, and the variable usage of classifiers and algorithms pose a challenge for ML-based image interpretation of rs-fMRI datasets to become a mainstream option for diagnosing AD and predicting the conversion of HC/MCI to AD.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    What, how and when to use knowledge in neural network application by Wan Ishak, Wan Hussain, Abdul Rahman, Shuzlina

    Published 2004
    “…The methodology comprises five steps namely variable selection, data collection, data preprocessing, training &validation, and testing.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    ANALYSIS OF PERFORMANCE PARAMETERS FOR WIRELESS NETWORK USING SWITCHING MULTIPLE ACCESS CONTROL METHOD by Shijer S.S., Sabry A.H.

    Published 2023
    “…Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. …”
    Article
  8. 8
  9. 9

    Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier by Hassan, Raini, Taha Alshaikhli, Imad Fakhri, Ahmad, Salmiah

    Published 2017
    “…Today’s digital lifestyles are changing rapidly and already moving towards the Big Data phenomenon. The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network by Qasem, Yaaqob Ali Ahmed

    Published 2010
    “…Demand for broadband access networks has grown rapidly with the increased demand for Internet connectivity and multimedia services. Fixed broadband wireless access systems based on the IEEE 802.16 standard defines the wireless broadband access technology called WiMAX (Worldwide Interoperability Microwave Access), which introduces several interesting advantages including variable and high data rate, last mile wireless access, mesh and point to multipoint communication, large frequency range and QoS (Quality of Service) for various types of applications. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Early Admission Selection Process Into Sixth Form Science Streams Using Neural Networks Model by Wong, Tuck Sung

    Published 2000
    “…A correct prediction of 92.18% accuracy was achieved using this Neural Networks model. Analysis of the data showed a reasonably strong correlation between the input variables, which consisted of subjects’ marks, aggregates and grades achieved, with the targeted output variable, which was the offer to continue with Sixth Form. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications by IZZAH NILAMSYUKRIYAH, BUANG, Kartinah, Zen, Syahrul Nizam, Junaini

    Published 2025
    “…Key topics examined include AI-enhanced adaptive data rate (ADR) methods, coding schemes based on the Chinese Remainder Theorem (CRT), and processes utilizing Variable Order Hidden Markov Models (VHMM). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Malay continuous speech recognition using continuous density hidden Markov model by Ting, Chee Ming

    Published 2007
    “…The result expects its well performance in SI task in the future. A connected words ASR is developed and evaluated on Malay connected digit task and has achieved reasonably good accuracy with limited training data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…This framework uses an evolving data clustering algorithm by adopting the concept of grid granularity to capture the features of a cluster more efficiently. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali by Sam , Koohikamali

    Published 2015
    “…Microgrid is able to supply its local load based on operator decision and decline the power oscillations caused by solar photovoltaic (PV) plant together with variable loads. An algorithm is also proposed which helps to precisely design the battery energy storage plant. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Keyword query processing interface model of ontological natural language manipulation by Hasany, Syed Muhammad Noman

    Published 2010
    “…We used the shortest path algorithms to be called on certain resources to explore connectivity to reduce complexity of search. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance analysis of interface bonding and channel bonding at point to point wireless 802.11n by Shidik, Guruh Fajar

    Published 2011
    “…This is caused by Media Independent Interface (MII), and Scheduling Algorithm are unable to work properly at wireless 802.11n that is used in Point to Point connection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…Using system identification techniques, this paper came up with a way to pick a mathematical model for a cupping suction system that would meet the needs of the controller. The input and output data were used to create this modeling output variable of the cupping suction system is detected by connecting a differential pressure sensor to the cup, while the input variable is determined by the speed of the pump applied in various locations. …”
    Get full text
    Get full text
    Undergraduates Project Papers