Search Results - (( development evaluation server algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…So, the objective for this paper is to evaluate the results in the benchmark paper and to evaluate the implementation of LACE algorithm in a huge number of servers within one cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…There are few load balancing algorithms available that help load balance works efficiently across multiple servers. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Evaluation of structured questions using modified BLEU algorithm by Siraj, Fadzilah, Ali, Mohamed Salem

    Published 2016
    “…This paper describes and exemplifies an application of a Structured Exam Questions Test Bank and Evaluation Using Modified Bilingual Evaluation Understudy (BLEU) Algorithm, a software system developed in pursuit of robust computerized marking of free-text answers to open-ended questions.It employs the Information System Development Research Methodology with modified BLEU Algorithm and Expert System for similar words.The system was developed to facilitate in managing and administrating structured questions for client/server architecture based on intranet. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of arima and ann stream analytics for air quality monitoring system by Nurmadiha, Osman

    Published 2021
    “…The data stored in the query table act as input to the analytics algorithm, which runs in R-server as well. In this thesis, two algorithms have been implemented and compared. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…Experiments and many evaluations are conducted to validate the proposed algorithms on iPhone. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers by Khoshkholghi, Mohammad Ali, Derahman, Mohd Noor, Abdullah, Azizol, Subramaniam, Shamala, Othman, Mohamed

    Published 2017
    “…Cloud computing has evolved with the development of large-scale data centers, including thousands of servers around the world. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Natural disaster mitigation system with an IoT based TTGO T-Call V1.3 ESP32 wireless module microcontroller / Muhammad Fareez Asyraf Istas Fahrurrazi by Fahrurrazi, Muhammad Fareez Asyraf Istas

    Published 2024
    “…The methodology entails gathering sensor data, evaluating it with a decision-making algorithm, triggering alarms, activating output devices, and transmitting data to the server via HTTP protocols. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The parallel computing laboratory is configured for homogeneous systems using MATLAB Distributed Computing Server (MDCS) with Windows 7 operating system. The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi-source data fusion framework for remote triaging and prioritization in telemedicine by Salman, Omar Hussein

    Published 2015
    “…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud by Farid, Mazen, Latip, Rohaya, Hussin, Masnida, Abdul Hamid, Nor Asilah Wati

    Published 2021
    “…Background: Recent technological developments have enabled the execution of more scientific solutions on cloud platforms. …”
    Get full text
    Get full text
    Article