Search Results - (( developing bring function algorithm ) OR ( java simulation approach algorithm ))
Search alternatives:
- function algorithm »
- developing bring »
- java simulation »
- bring function »
-
1
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…These chatbots acquired its intelligence through a hybrid approach that combines pattern-matching technique and machine learning algorithm in order to formulate its responses. …”
Get full text
Get full text
Conference or Workshop Item -
2
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
Get full text
Get full text
Get full text
Thesis -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
Development of a scalable video compression algorithm
Published 2012“…The choice of a scalable video coding framework in this context brings technical and economical advantages. The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Design and development of an intelligent battery charger station
Published 2009“…The fast charge cycle bring the battery to approximately 90% of the full charge condition. …”
Get full text
Get full text
Monograph -
6
Application of Bee Colony Optimization (BCO) in NP-Hard Problems
Published 2011“…Bee-Inspired algorithms were presumed to bring the new direction in the field of Swann Intelligence. …”
Get full text
Get full text
Final Year Project -
7
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The simulation results demonstrated the proposed approach significantly enhanced the performance of the baseline works.…”
Get full text
Get full text
Article -
8
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…This thesis introduces an innovative signal detector algorithm in facilitating the cognitive radio functionality for the new IEEE 802.22 Wireless Regional Area Networks (WRAN) standard. …”
Get full text
Get full text
Get full text
Thesis -
9
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
Get full text
Get full text
Thesis -
10
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. Energy efficient iPath (E-iPath) is evaluated with several variations of nodes in WSN deployments as well as large-scale simulations. …”
Get full text
Get full text
Get full text
Article -
11
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results show the effectiveness of proposed MAS approaches for selecting the best DG location in a function of improved power system grounding and reliability. …”
Get full text
Get full text
Thesis -
12
Modelling of multi-robot system for search and rescue
Published 2023“…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…The project achieve objectives by using RAD (Rapid Application Development) approach as the guideline and by making sure that this application is filled with great user experiences and functionality goals. …”
Get full text
Get full text
Thesis -
14
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The separation of control functionality from forwarding devices brings orchestration and management to enable 5G network programmability. …”
Get full text
Get full text
Thesis -
15
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…To conduct this experiment, we employed the CloudSim simulator, which is implemented using the Java programming language.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
17
Scentopia: Navigating the World of Fragrance
Published 2024“…This research presents a comparative analysis that emphasises the unique qualities of Scentopia above other platforms in the market, highlighting its large database size, sophisticated recommendation algorithm, and high degree of personalisation. The research also looks into potential future projects, such as adding a visual search function, bringing the application to Android and other platforms, allowing for ongoing user feedback, and doing routine maintenance and updates. …”
Get full text
Get full text
Final Year Project -
18
Internet access using encrypted membercard / Muhammad Syafiq Sopian
Published 2021“…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. …”
Get full text
Get full text
Student Project -
19
Android Ransomware Detection Based on Dynamic Obtained Features
Published 2024journal::journal article -
20
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…Due to its significant function, whereby a conversion of manual procedure into a web based module is necessary, this module will be effective and brings benefits to the authorities, Halal logistic service providers and also users.…”
Get full text
Get full text
Thesis
