Search Results - (( developing interaction growth algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Stochastic optimal control of economic growth model under research and development investment with Kalman filtering approaches by Lim, Yue Yuin, Kek, Sie Long, Leong, Wah June

    Published 2022
    “…This article examines an economic growth model that expresses the interaction between production, technology stock, and research and development (R&D) investments. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…So, Self-Adaptive SFM is developed in order to estimate a good quality of interaction forces since it is crucial to achieve better abnormal detection, which represents the behavior of the crowd. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Benchmarking of Bat-inspired Interaction Testing Strategy by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B.

    Published 2016
    “…Recently, there are growing interests for adopting optimization algorithms as the basis of the newly developed strategies contributing to the new and upcoming search based software testing (SBST) area of research. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Investment, trade and exchange rates / Noor Zahirah Mohd Sidek and Mahadzir Ismail by Mohd Sidek, Noor Zahirah, Ismail, Mahadzir

    Published 2012
    “…Higher income per capita can only be achieved with higher growth of GDP. In the past, GDP growth in Malaysia is supported by the influx of foreign direct investment which fuels the export-oriented industries. …”
    Get full text
    Get full text
    Research Reports
  8. 8
  9. 9

    Estimating the optimal threshold value for foreign investment in Malaysia / Noorzahirah Mohd Sidek and Mahadzir Ismail by Mohd Sidek, Noorzahirah, Ismail, Mahadzir

    Published 2012
    “…Eventually, the theoretical model serves as a benchmark model which would be useful for future simulations, predictions and other extensions in growth modelling in developing world.…”
    Get full text
    Get full text
    Research Reports
  10. 10
  11. 11
  12. 12

    Sales prediction of religious product and services of Mutawwif Haramain Travel & Tours using predictive analytics by Mohd Sabri, Nurul Ainin Qistina

    Published 2025
    “…The model is scalable for future growth at MHTT and can be applied to other sectors. …”
    Get full text
    Get full text
    Student Project
  13. 13
  14. 14

    A study of graduate on time (GOT) for Ph.D students using decision tree model by Chin, Wan Yung, Ch’ng, Chee Keong, Mohd Jamil, Jastini

    Published 2019
    “…Historical data that related to all Ph.D students in a public university in Malaysia has been obtained directly from the database of Graduate Academic Information System (GAIS) in order to develop and compare the performance of decision tree models (Chi-square algorithm, Gini index algorithm, Entropy algorithm and an interactive decision tree). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Conceptual deployment models to secure cloud computing / Hajar Ziglari by Ziglari, Hajar

    Published 2012
    “…The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Characterization of Internet Traffic in UUM Wireless Networks by Abdullah, Wisam Dawood

    Published 2012
    “…Therefore, understanding the behavior of traffic analysis helps us to develop, manage WLAN technology, and deploy. It help us to apply our workload analysis results to issues in wireless network deployment, such as capacity planning, and potential network optimizations, such as algorithms for load balancing across multiple Access Points (APs) in a wireless network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…As proof of concept, a Top-up printing system is developed and for interaction with contactless interface, an ACR 100 Reader with ACOS3 SIM card is used. …”
    Get full text
    Get full text
    Get full text
    Article