Search Results - (( developing security implications algorithm ) OR ( java estimation using algorithm ))
Search alternatives:
- implications algorithm »
- security implications »
- developing security »
- java estimation »
- using algorithm »
-
1
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
2
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
Get full text
Get full text
Get full text
Monograph -
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The proposed method uses a rank accuracy estimation model to decide the rank-1 value to be applied for the decomposition. …”
Get full text
Get full text
Article -
4
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
5
Fingerprint frontier: the evolution of biometric security
Published 2023“…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
Get full text
Get full text
Get full text
Book -
6
-
7
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Estimation of dielectric constant for various standard materials using microstrip ring resonator
Published 2017“…The differences in frequency shift were used in NetBeans IDE 8.1 algorithm of Java for dielectric constant calculation. …”
Get full text
Get full text
Article -
9
JTAGGER
Published 2006“…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
Get full text
Get full text
Final Year Project -
10
Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming
Published 2024“…Furthermore, the insights generated from this research have implications for shaping policies and regulations related to food security and agricultural sustainability.…”
Get full text
Get full text
Conference or Workshop Item -
11
A New Hybrid Embedding Method in Iris Biometric System
Published 2013“…The good PSNR value is between 40-50 dB. The implication of this study contributes to a higher accuracy in iris biometric security. …”
Get full text
Get full text
Article -
12
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
A new hybrid embedding method in iris biometric system
Published 2013“…The good PSNR value is between 40-50 dB. The implication of this study contributes to a higher accuracy in iris biometric security. …”
Get full text
Get full text
Get full text
Article -
14
Cyber hygiene during Covid-19 to avoid cyber attacks
Published 2022“…This project is a research study on cyber hygiene during COVID-19 to avoid cyber-attacks for academic purposes. Cyber security is crucial in today's cyber defence. Cyber security expenses have increased over the past decade while massive infringements of data and data leaks have also risen. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Enhancing smart city mobility using Software Defined Networks
Published 2024“…This paper investigates SDN's role in enhancing urban sustainability and analyzes its implications for sustainable cities. The paper categorizes the use of SDN technology to improve various aspects of smart cities into three categories: Emergency Services and Traffic Management, Security and DDoS Defense, and Network Performance. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Multi-objective portfolio selection with skewness preference: An application to the stock and electricity markets / Karoon Suksonghong
Published 2014“…The superiority of this method is its ability to generate a set of MVS efficient portfolios within a single run of algorithm. The non-dominated sorting genetic algorithm II (NSGA-II), the improved strength Pareto evolutionary algorithm II (SPEA-II), and the compressed objective genetic algorithm II (COGA-II) were applied. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Social dilemma to AI dilemma: what’s next
Published 2025“…The conclusion is that if humanity struggled to manage the implications of AI-driven algorithms in social media and ill-prepared for Generative AI, we will face the risks of an entirely different magnitude, potentially impacting our ability to control our future and even our existence. …”
Get full text
Get full text
Get full text
Article -
19
The influence of Robo-advisory services on Malaysia university student’s investment intention
Published 2025“…These results highlight the need for fintech developers and financial service providers to focus on building secure, user-friendly platforms that foster trust and address risk concerns, particularly when targeting young, techsavvy investors. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Application of Artificial Intelligence In Smart City
Published 2021“…Besides, studies and actual practices in foreign countries concluded that AI's implication brings a contribution to different sectors such as agricultural, governance, manufacturing, and medical field. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
