Search Results - (( developing _ intervention algorithm ) OR ( java evolution optimization algorithm ))
Search alternatives:
- intervention algorithm »
- evolution optimization »
- java »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
Get full text
Get full text
Conference or Workshop Item -
2
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…It is noted that active user intervention increases the acceleration of Genetic Algorithm towards an optimal solution. …”
Get full text
Get full text
Thesis -
3
-
4
i-Saturate: The New Discovery of Stopping Criterion in Genetic Algorithm
Published 2020“…A stopping criterion for evolutionary algorithms like Genetic Algorithm (GA) is crucial in determining the optimum solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Determining malaria risk factors in Abuja, Nigeria using various statistical approaches
Published 2018“…Studies have identified many driving factors of malaria prevalence; however, there are still missing links as malaria remains endemic in developing nations despite various interventions instituted against it especially in Sub-Saharan Africa (SSA). …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…The self-healing algorithm is design to reduce human intervention and continuous data collected in the remote areas. …”
Get full text
Get full text
Conference or Workshop Item -
9
Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip
Published 2017“…In this project, an algorithm is proposed and developed to build the global CDN that is used to distribute the clocks to all partitions in the SoC using the channels available between partitions. …”
Get full text
Get full text
Thesis -
10
Prediction of UiTM student academic performance using Naive Bayes algorithm / Muhammad Irfan Zahin Jailani
Published 2024“…With the help of customized interventions and early identification of at-risk pupils, the proposed approach seeks to increase graduation rates and overall achievement.The main objectives of this study include studying the Naive Bayes algorithm in student academic performance prediction, designing and developing a student academic performance prediction model utilizing Naive Bayes, and evaluating the accuracy of the prediction prototype using the developed model. …”
Get full text
Get full text
Thesis -
11
Predictive Modelling of Stroke Occurrence among Patients using Machine Learning
Published 2023“…Advanced machine learning algorithms, including logistic regression, decision trees, random forests, and support vector machines, were utilized to analyses the dataset and develop a predictive model. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali
Published 2025“…These insights can assist policymakers, mental health professionals, and marriage counselors in developing targeted interventions to support healthier relationships and strengthen societal well-being.…”
Get full text
Get full text
Thesis -
13
Screen-related dependency in children: algorithm for referral from primary care in Malaysia
Published 2025“…While there are general guidelines, i.e., limiting screen time by WHO, there are not yet any specific outlines or pathways provided for healthcare providers at the primary care level, especially in the Malaysian context. This algorithm was developed by a group of Malaysian experts for primary care, aiming to facilitate the early screening of screen-related dependency in pre-school children and its referral for psychological interventions. …”
Get full text
Get full text
Get full text
Article -
14
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019“…Therefore, the implementation of z-numbers is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. Thus, the objective of this paper is to propose a reliable fuzzy clustering algorithm using z-numbers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Development of a wearable human fall detection system
Published 2022“…In this study, an accelerometer and gyroscope sensors were installed in a wearable fall detector. A fall detection algorithm was developed using MATLAB. This algorithm will extract features from the signal sent by the sensors and conduct a series of decision-making and classification process to determine whether a fall has actually occurred. …”
Get full text
Get full text
Article -
16
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
17
-
18
-
19
Analysis of genetic data in for implementation of compression algorithm in Alzheimer's disease database
Published 2011“…Undergoing research is trying to develop interventions to both delay the onset of AD, as well as to slow the progression of the disease. …”
Get full text
Get full text
Research Reports -
20
Fine-scale predictive modeling of Aedes mosquito abundance and dengue risk indicators using machine learning algorithms with microclimatic variables
Published 2025“…This study developed fine-scale predictive models using machine learning algorithms; Artificial Neural Networks (ANN), Random Forest (RF), and Support Vector Machines (SVM) to estimate mosquito abundance and dengue risk at the species level based on daily microclimatic data (temperature, relative humidity, and rainfall) collected over 26 weeks in Kuala Selangor, Malaysia. …”
Get full text
Get full text
Get full text
Article
