Search Results - (( developing consumer usage algorithm ) OR ( java implication from algorithm ))
Search alternatives:
- developing consumer »
- java implication »
- implication from »
- usage algorithm »
- consumer usage »
- from algorithm »
-
1
-
2
Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform
Published 2014“…Overall, an algorithm showing the combination method of both GA and DCT was successfully developed. …”
Get full text
Get full text
Final Year Project -
3
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
4
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
5
Data mining and analysis for predicting electrical energy consumption
Published 2024“…The project's electricity consumers are categorized by their hourly power usage percentage. …”
Article -
6
Modelling of assembly line balancing with energy consumption
Published 2023“…One of the most gravitate issues in the world is energy usage. As the largest consumer in terms of energy usage, the manufacturing sector had introduced a lot of approaches to decrease their energy utilization. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
Brain tumor image segmentation using deep learning approach
Published 2022“…Deep learning algorithm is able to provide good tumor segmentation results compared to other conventional segmentation algorithms as it learns from the labeled brain MRIs to predict the location of tumor region and consequently segment the tumor. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Feature selection in intrusion detection, state of the art: A review
Published 2016“…Also, ambiguous features increase the time complexity and consume other computational resources as well. By removing these irrelevant and redundant features accuracy of the learning algorithms can be increased. …”
Get full text
Get full text
Article -
11
Energy-saving framework for data center from reduce, reuse and recycle perspectives
Published 2019“…We recategorized energy attributes of the existing Energy Efficient Data Center Frameworks (EEDCFs) to be aligned with 3R. Then, we developed energy-saving algorithms in response to the concept. …”
Get full text
Get full text
Get full text
Article -
12
A study of customer retention and churn rate management through data mining and customer profiling of Malaysian mobile user
Published 2012Get full text
Get full text
Conference or Workshop Item -
13
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…In addition, the mechanism improves the data gathering ratio by up to 70% and 68%, respectively. This is due to the developed technique helps to reduce the high consumed energy in the sensor network and increases the data collection throughout the transmission states in wireless sensor networks.…”
Get full text
Get full text
Article -
14
Predicting motorcycle customization preferences using machine learning
Published 2025“…The classification model was developed using the Random Forest algorithm, Support Vector Machine and Logistic Regression with 5-fold Cross validation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…Results from this study indicates the usage of k-NN is proven to be most effective algorithm in terms of performance and accuracy required by the shipping industry fraud detection.…”
text::Thesis -
16
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
17
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
18
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
Get full text
Get full text
Thesis -
19
A Model of FPGA-based Direct Torque Controller
Published 2013“…This paper presents a generic model of a fully FPGA-based direct torque controller. This model is developed using two’s-complement fixed-point format approaches, in register-transfer-level (RTL) VHDL abstraction for minimizing calculation errors and consuming hardware resource usage. …”
Get full text
Get full text
Article -
20
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis
