Search Results - (( communication competency based algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- communication competency »
- adaptation optimization »
- competency based »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
-
3
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…The research concludes that the IoT-based AGV prototype is competent and reliable in handling the obstacle detection in fixed route with indoor environment workplace.…”
Get full text
Get full text
Get full text
Article -
4
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
Get full text
Get full text
Thesis -
5
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Automate customer support handling E-Commerce enquiry using ChatGPT
Published 2024“…We are going to integrate this mechanism with e-commerce platform aligns with evolving customer communication preferences and enhances the business's competency in answering to customer inquiries on this e-commerce platform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
Get full text
Get full text
Get full text
Article -
8
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…To achieve this objective, an iterative approach based on swarm intelligence is used to find the optimal CQI threshold at which the competing criteria are optimized. …”
Get full text
Get full text
Thesis -
9
-
10
Investigating computational thinking among primary school students in Terengganu using visual programming
Published 2022“…The findings of this study reveal that although the participants’ CT skills competency in the animation phase is in the Basic level, there is improvement of CT skills competency to the Developing level in the game phase. …”
Get full text
Get full text
Thesis -
11
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…In particular, a Position-Based QoS Multicast Routing Protocol (PBQMRP) has been developed. …”
Get full text
Get full text
Article -
12
Ontology based approach to Fuzzy student model design
Published 2014“…ITS is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian networks, Ontology, Genetic Algorithms and Software Agents) to provide a personalized tutoring adaptable to each student based on his/her profile or characteristics. …”
Get full text
Get full text
Article -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
15
Measuring Enterprise Architecture / Siti Fatimah Azzahra Ibrahim
Published 2016Get full text
Get full text
Thesis -
16
