Search Results - (( data sharing process algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…The security provided by this algorithm can be enhanced further, if more than one algorithm is applied to data.…”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5

    Social learning and principal-agent problems in profit sharing contract by Sapuan N.M., Sanusi N.A., Ismail A.G., Wibowo A.

    Published 2023
    “…The data are collected from the period of 2009 to 2013 and it will be used for the simulation process by utilizing the genetic algorithm technique. …”
    Article
  6. 6

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…This implementation also proved that our proposed method of utilizing the shuffle instructions feature to share data between registers memory is able to achieve up to 11.45% and 36.54% speedup when compared with conventional methods of storing data in GPU global memory and shared memory respectively; The later implementation on Pascal architecture aims to achieve single high speed multiplication of larger size by utilizing the available GPU resources. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…By using the IP Address, can help easily to track location of anonymous. Then, time processing and accuracy which one is the best of algorithms will be determine. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Max-average: an extended max-min scheduling algorithm for Grid computing environtment by Maipan-uku, J. Y., Muhammed, Abdullah, Abdullah, Azizol, Hussin, Masnida

    Published 2016
    “…Grid computing can also be referred as a computing platform for users to utilise the remote heterogeneous resources for solving their large scale jobs that require a huge amount of processing power or a huge data storage. Sharing these resources that way effectively requires a very good scheduling strategy, which is the focus of this research. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…Machine-to-machine sharing of data involves the risk of data stealing or modification, which may further disrupt the working of manufacturing process and leads to poor quality product. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    The skyline operator algorithms: a review by Mohd Rum, Siti Nurulain, Mohd Ariffin, Noor Afiza, Asmawi, Aziah, Mohd Rum, Siti Fatimah, Dzolkhifli, Zarina

    Published 2019
    “…In the present decade, there is the revival of interest to find the best way to query the database that able to provide not only a single answer, but also a set of answers that can be the most preferred by users .In many cases, the overflow of data generated from social media, and many other data stored and shared over the Internet makes the data access becoming near –infinite to the users. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    COMPARATIVE PERFORMANCE OF SOME HYBRID HEURISTICS SCHEDULING ALGORITHMS BASED ON SLTR AND DEADLINE FOR COMPUTATIONAL GRID by AHMED ABBA, HARUNA

    Published 2013
    “…Research on Grid scheduling focuses in solving three challenges: finding a good algorithm, automating the process, and developing a scalable, robust and efficient scheduling mechanism. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau by Tan , Chee Hau

    Published 2020
    “…Production line commonly used algorithm such as shortest processing time (SPT), longest processing time (LPT), cycle time optimization and centre of gravity (CoG) algorithm are coded in this system which enables the production schedule and sequence to be optimized. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Sizes of Superpixels and their Effect on Interactive Segmentation by Goh, Kok Luong, Ng, Giap Weng, Muzaffar, Hamzah, Chai, Soo See

    Published 2021
    “…The use of superpixels is one example of such pre-processing step. A superpixel is a group of pixels that share similar characteristics such as texture and colour. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  20. 20

    K-Means Clustering Approach for Intelligent Customer Segmentation Using Customer Purchase Behavior Data by Kayalvily, Tabianan, Shubashini, Velu, VInayakumar, Ravi

    Published 2022
    “…It also enables high exposure of the e-offer to gain attention of potential customers. In order to process the collected data and segment the customers, an learning algorithm is used which is known as K-Means clustering. …”
    Get full text
    Get full text
    Article