Search Results - (( variable data connection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- connection algorithm »
- java application »
- data connection »
- variable »
-
1
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
Get full text
Get full text
Get full text
Thesis -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Resource Efficient For Hybrid Fiber-Wireless Communications Links In Access Networks With Multi Response Optimization Algorithm
Published 2021“…Mobile Ad-hoc Network (MANET) is currently popular at demand as a solution in numerous deployments that cover from the combat zone to the user’s parlor due to its quickly deployable with adaptive topology and able to function without any infrastructure. However, variable topology is one of the key challenges since the network throughput and energy consumption depends on number of possible connections. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…Nevertheless, various concerns over the homogeneity of data based on patient selection, scanner effects, and the variable usage of classifiers and algorithms pose a challenge for ML-based image interpretation of rs-fMRI datasets to become a mainstream option for diagnosing AD and predicting the conversion of HC/MCI to AD.…”
Get full text
Get full text
Get full text
Article -
6
What, how and when to use knowledge in neural network application
Published 2004“…The methodology comprises five steps namely variable selection, data collection, data preprocessing, training &validation, and testing.…”
Get full text
Get full text
Conference or Workshop Item -
7
ANALYSIS OF PERFORMANCE PARAMETERS FOR WIRELESS NETWORK USING SWITCHING MULTIPLE ACCESS CONTROL METHOD
Published 2023“…Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. …”
Article -
8
-
9
Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier
Published 2017“…Today’s digital lifestyles are changing rapidly and already moving towards the Big Data phenomenon. The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
Get full text
Get full text
Get full text
Article -
10
Interference avoidance routing and scheduling using multiple transceivers for IEEE 802.16 mesh network
Published 2010“…Demand for broadband access networks has grown rapidly with the increased demand for Internet connectivity and multimedia services. Fixed broadband wireless access systems based on the IEEE 802.16 standard defines the wireless broadband access technology called WiMAX (Worldwide Interoperability Microwave Access), which introduces several interesting advantages including variable and high data rate, last mile wireless access, mesh and point to multipoint communication, large frequency range and QoS (Quality of Service) for various types of applications. …”
Get full text
Get full text
Thesis -
11
Early Admission Selection Process Into Sixth Form Science Streams Using Neural Networks Model
Published 2000“…A correct prediction of 92.18% accuracy was achieved using this Neural Networks model. Analysis of the data showed a reasonably strong correlation between the input variables, which consisted of subjects’ marks, aggregates and grades achieved, with the targeted output variable, which was the offer to continue with Sixth Form. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…Key topics examined include AI-enhanced adaptive data rate (ADR) methods, coding schemes based on the Chinese Remainder Theorem (CRT), and processes utilizing Variable Order Hidden Markov Models (VHMM). …”
Get full text
Get full text
Get full text
Article -
13
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…The result expects its well performance in SI task in the future. A connected words ASR is developed and evaluated on Malay connected digit task and has achieved reasonably good accuracy with limited training data. …”
Get full text
Get full text
Get full text
Thesis -
14
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…This framework uses an evolving data clustering algorithm by adopting the concept of grid granularity to capture the features of a cluster more efficiently. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali
Published 2015“…Microgrid is able to supply its local load based on operator decision and decline the power oscillations caused by solar photovoltaic (PV) plant together with variable loads. An algorithm is also proposed which helps to precisely design the battery energy storage plant. …”
Get full text
Get full text
Thesis -
16
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…We used the shortest path algorithms to be called on certain resources to explore connectivity to reduce complexity of search. …”
Get full text
Get full text
Thesis -
17
Performance analysis of interface bonding and channel bonding at point to point wireless 802.11n
Published 2011“…This is caused by Media Independent Interface (MII), and Scheduling Algorithm are unable to work properly at wireless 802.11n that is used in Point to Point connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Modeling of cupping suction system based on system identification method
Published 2022“…Using system identification techniques, this paper came up with a way to pick a mathematical model for a cupping suction system that would meet the needs of the controller. The input and output data were used to create this modeling output variable of the cupping suction system is detected by connecting a differential pressure sensor to the cup, while the input variable is determined by the speed of the pump applied in various locations. …”
Get full text
Get full text
Undergraduates Project Papers
