Search Results - (( developing agent satisfaction algorithm ) OR ( java code classification algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  3. 3

    Development of appoinment scheduling agent using distributed constraint satisfaction (DisCS) by Mohd. Azmi, Nurulhuda Firdaus, Eri, Zeti Darleena, Ibrahim, Nuzulha Khilwani, Ahmad Rusli, Rozana Diana

    Published 2008
    “…The goal of this research is to develop appointment scheduling agent in reservation environment with implementation of Distributed Constraint Satisfaction (DisCS). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4
  5. 5

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…Moreover, results indicate that agents equipped by this learning capability can generate Pareto-efficient offers by MGT algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. …”
    Get full text
    Get full text
    Thesis
  7. 7