Search Results - (( developing world implication algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- implication algorithm »
- world implication »
- developing world »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
Get full text
Get full text
Thesis -
3
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Heart-design nexus: the emotion algorithm
Published 2025“…How might these approaches help create a world that is not just functionally efficient but emotionally enriching? …”
Get full text
Get full text
Book -
5
Fingerprint frontier: the evolution of biometric security
Published 2023“…It sparks an important conversation on the ethical implications and privacy concerns embedded into the fabric of biometric technologies. …”
Get full text
Get full text
Get full text
Book -
6
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Therefore, a new space-time fuzzy implication operator is introduced, by modifying the existing implication operators to accommodate time as an added dimension. …”
Get full text
Get full text
Thesis -
7
Mental stress classification based on selected electroencephalography channels using correlation coefficient of Hjorth parameters
Published 2023“…The implications of this research are profound, offering a stepping stone toward the development of real-time stress detection devices, and consequently, enabling clinicians to make more informed therapeutic decisions based on comprehensive brain activity monitoring…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
An efficient unknown detection approach for RFID data stream management system
Published 2025“…The materials and methods employed include comprehensive simulations and real-world RFID data streams to validate the algorithm's effectiveness. …”
Get full text
Get full text
Get full text
Article -
9
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…4th Industrial revolution are spreading around the world, embedding the technology into societies. In the digital revolution, high technological tools and resources are regularly being developed. …”
Get full text
Get full text
Conference or Workshop Item -
10
Aligning Malaysian SMEs with the megatrends: the roles of HPWPs and employee creativity in enhancing Malaysian SME performance
Published 2018“…Leveraging the findings of the extant body of literature, small and medium enterprises (SMEs) in Malaysia, like any other country of the world, are central to economic development, industrial development, job creation and poverty reduction. …”
Get full text
Get full text
Article -
11
The relationships between brand attributes and word of mouth on brand identity and brand image
Published 2017“…Companies all around the world have to deal with issues relating to brand image development and maintenance because brand image can affect their brand performance. …”
Get full text
Get full text
Get full text
Thesis -
12
Enhanced foreign exchange volatility forecasting using CEEMDAN with optuna-optimized ensemble deep learning model
Published 2024“…Furthermore, the hyperparameters for the DL models are optimized using the Optuna algorithm. Finally, a hybrid ensemble model for forecasting exchange rate volatility is developed by combining the predictions of three distinct DL models. …”
Get full text
Get full text
Get full text
Article -
13
A conceptual anonymity model to ensure privacy for sensitive network data
Published 2021“…The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
