Search Results - (( communication competency based algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1
  2. 2
  3. 3

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…The research concludes that the IoT-based AGV prototype is competent and reliable in handling the obstacle detection in fixed route with indoor environment workplace.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Automate customer support handling E-Commerce enquiry using ChatGPT by Teo, Wen Jin

    Published 2024
    “…We are going to integrate this mechanism with e-commerce platform aligns with evolving customer communication preferences and enhances the business's competency in answering to customer inquiries on this e-commerce platform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems by Salman, Mustafa Ismael

    Published 2015
    “…To achieve this objective, an iterative approach based on swarm intelligence is used to find the optimal CQI threshold at which the competing criteria are optimized. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Investigating computational thinking among primary school students in Terengganu using visual programming by Osmanullrazi, Abdullah

    Published 2022
    “…The findings of this study reveal that although the participants’ CT skills competency in the animation phase is in the Basic level, there is improvement of CT skills competency to the Developing level in the game phase. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Position-based multicast routing in mobile ad hoc networks: an analytical study by Qabajeh, Mohammad M., Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Qabajeh, Liana K.

    Published 2012
    “…In particular, a Position-Based QoS Multicast Routing Protocol (PBQMRP) has been developed. …”
    Get full text
    Get full text
    Article
  12. 12

    Ontology based approach to Fuzzy student model design by Muhammad Sani, Salisu, Mohd Aris, Teh Noranis

    Published 2014
    “…ITS is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian networks, Ontology, Genetic Algorithms and Software Agents) to provide a personalized tutoring adaptable to each student based on his/her profile or characteristics. …”
    Get full text
    Get full text
    Article
  13. 13

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16