Search Results - (( developing effective aggregation algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- aggregation algorithm »
- implication based »
- java implication »
-
1
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
2
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…Multi-objective Genetic Algorithms (MOGA) are an extension of Genetic Algorithms (GA) that does not require multiple objectives to be aggregated to one value. …”
Get full text
Get full text
Proceeding Paper -
3
A decomposition/aggregation method for solving electrical power dispatch problems
Published 2023“…This paper presents a new approach to solving the Economic Dispatch (ED) Problem for a large number of generators using a decomposition / aggregation method. A program has been developed to demonstrate the algorithm using the MATLAB programming language. …”
Conference paper -
4
-
5
Machine learning models for predicting the compressive strength of concrete with shredded pet bottles and m sand as fine aggregate
Published 2025“…This study investigates the use of ML algorithms to predict the compressive strength of grade 30 concrete, incorporating shredded PET bottles and M-sand as fine aggregates. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…This paper presents a new protocol to address the security and energy issue in Wireless Sensor Network (WSN). This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
Get full text
Get full text
Article -
7
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
8
-
9
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…In developing the system, data was collected to obtain information and to produced recommendation to user. …”
Get full text
Get full text
Thesis -
10
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…Comparison of this framework continue in some of the state-of-the-arts algorithm in the literature and the results is outperformed based on the proposed algorithm experimental result.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Selection of investment company based on interval neutrosophic vague heronian operator
Published 2022“…To deal with these problems, aggregation operator (AO) and set theory play a vital role. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
Article -
14
An In-Depth Analysis of Text Clustering Techniques for Identifying Potential Insurance Customers on Social Media: A Machine Learning Perspective
Published 2023“…This research focuses on the development of a social media web crawler, coupled with the implementation of sophisticated algorithms like Web Content Mining, Noisy Text Filtering, Named Entity Extraction, Part-Of-Speech (POS) Tagging, and Text Clustering. …”
Get full text
Get full text
Get full text
Article -
15
Modeling of mechanical properties of silica fume-based green concrete using machine learning techniques
Published 2022“…The six most influential factors, i.e., cement, fine aggregate, coarse aggregate, water, superplasticizer, and silica fume, were considered as significant input parameters. …”
Get full text
Get full text
Article -
16
Robust Data Fusion Techniques Integrated Machine Learning Models For Estimating Reference Evapotranspiration
Published 2022“…As for the NNE, a novel meta-learner based on the stochastic-enabled extreme learning machine integrated with whale optimisation algorithm (WOA-ELM) was developed and used in such an application for the first time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
STRUCTRAL BEHA VIORE OF REINFORCED CONCRETE BEAMS STRENGTHED FOR SHEAR USING CFRP LAMINATES SUBJECTED TO CYCLIC LOADING
Published 2010“…In this research, an analytical model based on non-linear finite element algorithms coded in FORTRAN language was developed to enable the analysis of R.C beams externally strengthened for shear using CFRP laminates subjected to cyclic loads. 20-noded isoparametric quadrilateral elements with three degrees of freedom per each node were used to represent concrete. …”
Get full text
Get full text
Thesis -
18
An In-Depth Analysis of Text Clustering Techniques for Identifying Potential Insurance Customers on Social Media: A Machine Learning Perspective
Published 2023“…This research focuses on the development of a social media web crawler, coupled with the implementation of sophisticated algorithms like Web Content Mining, Noisy Text Filtering, Named Entity Extraction, Part-Of-Speech (POS) Tagging, and Text Clustering. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Distributed Denial-of-Service Defense System
Published 2006“…The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. …”
Get full text
Get full text
Final Year Project -
20
Fuzzy Evaluation and Benchmarking Framework for Robust Machine Learning Model in Real-Time Autism Triage Applications
Published 2025“…Our findings highlight the effectiveness of PCA algorithms, yielding 12 principal components with acceptable variance. …”
Article
