Search Results - (( developing agent context algorithm ) OR ( java data virtualization algorithm ))
Search alternatives:
- virtualization algorithm »
- data virtualization »
- context algorithm »
- developing agent »
- java »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…The developed software agent is utilized to implement prioritized token access subject to the traffic type. …”
Get full text
Get full text
Article -
2
Embodied conversational agents for H5N1 pandemic crisis
Published 2007“…A Crisis Communication Network, called CCNet, is established based on a novel algorithm incorporating natural language query and embodied conversation agent simultaneously. …”
Get full text
Get full text
Get full text
Article -
3
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Hybridization of nonlinear sine cosine and safe experimentation dynamics algorithms for solving control engineering optimization problems
Published 2024“…Moreover, the Nonlinear Sine Cosine Algorithm-Safe Experimentation Dynamic (NSCA-SED) introduces a hybridization of multi-agent and single-agent algorithms, presenting a dynamic approach with random perturbation to navigate search trajectories effectively, and release design parameters that might be trapped in local optima. …”
Get full text
Get full text
Thesis -
5
Automate customer support handling E-Commerce enquiry using ChatGPT
Published 2024“…The project scope is the development of a comprehensive mechanism for context handling, an inconspicuous human takeover process, and the summarization of entire conversations between customers and automated customer support before handover to human agents. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Additionally, this problem exacerbates in the context of SDNs unlike traditional networks. The SDN controller signifies a single point of failure and thus serves as a potential primary target for attackers. …”
Get full text
Get full text
Thesis
