Search Results - (( developing effective replication algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- effective replication »
- replication algorithm »
- application stemming »
- stemming algorithm »
- java application »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
2
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm
Published 2023“…Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Data collection experiments yield a diverse dataset of hand gestures, including variations in speed, essential for algorithm development. The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…Despite worldwide rapid development in 3D imaging technologies, documentation of 3D cultural assets in Malaysia is still very much reliant upon conventional techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Multi-parametric optimization of aerodynamic performance and pedestrian crash in sedan front-end profiles
Published 2025“…A multiobjective optimization framework was developed using computational simulations, mathematical modelling, and evolutionary algorithms. …”
Get full text
Get full text
Thesis -
11
An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali
Published 2025“…The hardware implementation successfully replicated the simulated results, demonstrating the effectiveness of the proposed FLC-based speed control system. …”
Get full text
Get full text
Thesis -
12
Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era
Published 2025“…Drawing on Qur’ānic exegesis, classical Islamic scholarship, and contemporary AI ethics, it contrasted natural intelligence with machine computation and highlighted the unique moral, spiritual, and teleological dimensions of humanity that cannot be replicated by algorithms. The article then applied the al-Istikhlāf framework to assess AI’s impact on identity, psychology, social relations, labour, and spiritual life. …”
Get full text
Get full text
Get full text
Article -
13
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…The final objective is to explore cost-effective methods that could provide fundamental guidelines on the best practice approach for digital heritage in Malaysia.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Development of an artisanal fermentation: case studies on Carica papaya leaf and Garcinia Mangostana pericarp / Mohamad Sufian So’aib
Published 2020“…Fermented CPL displayed higher acute toxicity effect (LC50) than fermented GMP i.e. 133.1 μg/mL vs 100.2 μg/mL, respectively. …”
Get full text
Get full text
Thesis -
15
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…Despite the recent advances in access control models, there are still issues that impede the development of effective access control. Among them is the lack of assessments for the user to authorize access, which comprises reliance on identity, purpose, and role. …”
Get full text
Get full text
Thesis -
16
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…The final objective is to explore cost-effective methods that could provide fundamental guidelines on the best practice approach for digital heritage in Malaysia.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…The final objective is to explore cost-effective methods that could provide fundamental guidelines on the best practice approach for digital heritage in Malaysia.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS
Published 2019“…The suggested barriers could effectively reduce the degree of rockfalls hazard. …”
Get full text
Get full text
Thesis -
19
Determination of transfer capability considering risk and reliability cost/ worth assessment in dynamic and static system cascading collapses / Nur Ashida Salim
Published 2015“…The proposed research methodology involved developing an algorithm commenced with a fault occurrence and then followed by the propagation of power system component tripping events which is defined as the system cascading collapse. …”
Get full text
Get full text
Thesis -
20
