Search Results - (( development case intention algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…In addition, the results of the case studies (with critical line outage) showed that the MDEP algorithm was able to obtain the optimal intentional islanding strategy with minimal power flow disruption.…”
    text::Thesis
  3. 3

    Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics by Mosa, Mohammad Rasmi Hassun

    Published 2013
    “…The proposed framework aims to use cyber crime evidence to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a new algorithm called Attack Intention Analysis, which predicts cyber crime intentions by combining Dempster-Shafer theory and a causal network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Comparative analysis of sine cosine and social network search-based algorithm for software test redundancy reduction optimization by Mekeng, Ambros Magnus Rudolf, Kamal Z., Zamli, Muhammad Zarlis, .

    Published 2024
    “…More precisely, our work intents to investigate the algorithms' performance in terms of test reduction percentage and execution time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants by Masrom, S., Tarmizi, M.A., Halid, S., Rahman, R.A., Abd Rahman, A.S., Ibrahim, R.

    Published 2023
    “…This indicates the potential of these algorithms in effectively measuring and predicting professional accountants' intentions to comply with anti-money laundering regulations. …”
    Get full text
    Get full text
    Article
  8. 8

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…In one-side incomplete information problem, comparison between MGT algorithm and smart random trade-offs (SRT) algorithm indicates that MGT outperforms SRT. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  10. 10

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    From AI to Experience How Personalization Shapes Online Shopping Journeys in E-Marketplaces by Raeni Dwi, Santy, Yoga, Wicaksana, Mohammad Fauzil, Adhim

    Published 2025
    “…This study contributes to the literature on AI-enabled retail in emerging markets, positioning Indonesia as a key case for understanding the future of e-commerce in Southeast Asia.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article