Search Results - (( developing consumer usage algorithm ) OR ( java implication drops algorithm ))

Refine Results
  1. 1
  2. 2

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Overall, an algorithm showing the combination method of both GA and DCT was successfully developed. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis by Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Data mining and analysis for predicting electrical energy consumption by Khudhair I.Y., Dhahi S.H., Alwan O.F., Jaaz Z.A.

    Published 2024
    “…The project's electricity consumers are categorized by their hourly power usage percentage. …”
    Article
  6. 6

    Modelling of assembly line balancing with energy consumption by Ariff Nijay, Ramli, Mohd Fadzil Faisae, Ab Rashid

    Published 2023
    “…One of the most gravitate issues in the world is energy usage. As the largest consumer in terms of energy usage, the manufacturing sector had introduced a lot of approaches to decrease their energy utilization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Brain tumor image segmentation using deep learning approach by Darshan, Suresh

    Published 2022
    “…Deep learning algorithm is able to provide good tumor segmentation results compared to other conventional segmentation algorithms as it learns from the labeled brain MRIs to predict the location of tumor region and consequently segment the tumor. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…Also, ambiguous features increase the time complexity and consume other computational resources as well. By removing these irrelevant and redundant features accuracy of the learning algorithms can be increased. …”
    Get full text
    Get full text
    Article
  10. 10

    Energy-saving framework for data center from reduce, reuse and recycle perspectives by Mohd Nor, Norhashimi, Hussin, Masnida, Abdullah, Rusli

    Published 2019
    “…We recategorized energy attributes of the existing Energy Efficient Data Center Frameworks (EEDCFs) to be aligned with 3R. Then, we developed energy-saving algorithms in response to the concept. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks by Al-Mekhlafi, Zeyad Ghaleb Aqlan, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Shamsan Saleh, Ahmed M.

    Published 2018
    “…In addition, the mechanism improves the data gathering ratio by up to 70% and 68%, respectively. This is due to the developed technique helps to reduce the high consumed energy in the sensor network and increases the data collection throughout the transmission states in wireless sensor networks.…”
    Get full text
    Get full text
    Article
  13. 13

    Predicting motorcycle customization preferences using machine learning by Saputra, Ananta, Utoro, Rio Korio, Roedavan, Rickman, Soegiarto, Duddy, Moorthy, Kohbalan, Pratondo, Agus

    Published 2025
    “…The classification model was developed using the Random Forest algorithm, Support Vector Machine and Logistic Regression with 5-fold Cross validation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…Results from this study indicates the usage of k-NN is proven to be most effective algorithm in terms of performance and accuracy required by the shipping industry fraud detection.…”
    text::Thesis
  15. 15

    Energy and performance efficient resource allocation for cloud-based data centers by Akhter, Nasrin

    Published 2015
    “…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing by HAJA NAZMUDEEN, MOHAMED SALEEM

    Published 2012
    “…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A Model of FPGA-based Direct Torque Controller by Sutikno, Tole, Nik Idris, Nik Rumzi, Jidin, Aiman Zakwan, Jidin , Auzani

    Published 2013
    “…This paper presents a generic model of a fully FPGA-based direct torque controller. This model is developed using two’s-complement fixed-point format approaches, in register-transfer-level (RTL) VHDL abstraction for minimizing calculation errors and consuming hardware resource usage. …”
    Get full text
    Get full text
    Article
  18. 18

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Structural hybridization and economical optimization of strengthening systems used for concrete beams / Md. Moshiur Rahman by Md. Moshiur, Rahman

    Published 2016
    “…In these models, an analytical approach was made with the help of the genetic algorithm optimization procedure to avoid time-consuming trial and error. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Halal authentication of alcohol in food and beverages products: a review by Mohamad Ikhiwan, Nur Hanisah, Tukiran, Nur Azira

    Published 2024
    “…Various analytical methods have been developed to confront this issue, including using gas chromatography, mass spectrometry, electronic nose, and a combination of machine learning algorithms, biosensors, and specific gravimetry methods. …”
    Get full text
    Get full text
    Get full text
    Article