Search Results - (( developing effective theory algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…The novel algorithm has proven to be an effective scheduling technique for smart grid applications.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    The effect of GA parameters on the performance of GA-based QoS routing algorithm by Yussof S., See O.H.

    Published 2023
    “…Genetic algorithm (GA) is a powerful search and optimization algorithm inspired by the theory of genetics and natural selection. …”
    Conference paper
  4. 4

    Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory by Ng, Peng Hong

    Published 2015
    “…Finally, the algorithm to obtain a general FTCS framework is developed to provide compensation of the sensor faults through the introduction of a new control law unto the existing nominal one. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI by Toh, Han Yaung

    Published 2019
    “…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Visualization Tool for Pathfinding Algorithms by Mathias Sam, Francis

    Published 2023
    “…This final year project aims to address the challenges faced by students in comprehending pathfinding algorithms by developing a web-based visualization tool. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  7. 7

    Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems by Kek, Sie Long

    Published 2011
    “…Instead of solving the original optimal control problem, the model-based optimal control problem is solved. The algorithm developed in this thesis contains three sub-algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants by Masrom, S., Tarmizi, M.A., Halid, S., Rahman, R.A., Abd Rahman, A.S., Ibrahim, R.

    Published 2023
    “…Alongside demographic factors, the study evaluates the effectiveness of each algorithm in anti-money laundering compliance by utilizing five attributes derived from the Protection Motivation Theory (PMT). …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…To achieve the aim of this study, Design Science methodology was used through three main phases: problem identification, design of solution, and evaluation. The algorithm was developed based on three theories of personality traits, namely Myers-Briggs Type Indicator (MBTI), Shape, and Multiple Intelligence (MI). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Power system stabilization based on artificial intelligent techniques: a review by Hassan, L.H., Moghavvemi, M., Mohamed, H.A.F.

    Published 2009
    “…The review efforts geared towards PSS and excitation system stabilizer developed based on AI techniques, which effectively enhance both small signal stability and transient stability and equally provide superior performances. …”
    Get full text
    Conference or Workshop Item
  15. 15

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  16. 16
  17. 17

    Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman by Osman, Mohamad Shaiful

    Published 2010
    “…This research is made for a system with fully integrated facilities for analyzing , monitoring and controlling of batch plant based on graph theory, batch modelling by means of Petri net algorithm and theory, control and configuration of SCADA system. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Effective software fault localization based on complex network theory / Abubakar Zakari by Abubakar , Zakari

    Published 2019
    “…This work aims to conduct an investigative study of the claimed problematic parallel debugging approach in comparison with OBA debugging approach and MSeer parallel debugging approach in terms of localization effectiveness. Furthermore, two novel fault localization techniques based on complex network theory, namely multiple fault localization based on complex network theory (FLCN-M) and single fault localization based on complex network theory (FLCN-S), are proposed to improve localization effectiveness, and to aid developers’ to localize multiple faults simultaneously in a single diagnosis rank list. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis