Search Results - (( development its replication algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  7. 7

    An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing by Saufi, Bukhari

    Published 2020
    “…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Routing problem in rectangular mesh network using Dijkstra’s based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2018
    “…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…Data collection experiments yield a diverse dataset of hand gestures, including variations in speed, essential for algorithm development. The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm by Ahmed Ali Mohammed, Al-saffar

    Published 2024
    “…The empirical results display that the proposed DC-CRNN and its SSA hybridization are capable of autonomously finding and selecting the best CRNN for a specific dataset. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A novel approach to motion modeling using fuzzy cognitive map and artificial potential fields by Motlagh, Omid Reza Esmaeili, Tang, Sai Hong, Ramli, Abdul Rahman, Ismail, Napsiah, Nakhaeinia, Danial

    Published 2010
    “…The robot trajectory under supply of such decision matrices has likelihood of nearly 90% with its trajectory under the APF. Replication of robot motion is therefore achieved by modeling its decision behaviors in form of tangible matrices.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Designing an expressive virtual Kompang on mobile device with tri-axial accelerometer by Leng, Hoo Yong, Mohd Norowi, Noris, Jantan, Azrul Hazri

    Published 2018
    “…An application of the virtual instrument for Kompang is described with an evaluation of the system with ideas for future developments. Result from the study showed that the feature extraction algorithm had an accuracy of 86.78% at detecting drum hit at its peak acceleration value. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Malware, such as spyware, ransomware, and self-replicating worms, is designed to steal credentials and gain remote access while obfuscating its code to evade detection by traditional analysis systems. …”
    thesis::doctoral thesis
  15. 15

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Finger-Vein Biometric Identification Using Convolutional Neural Network by Syafeeza, Ahmad Radzi, Mohamed, Khalil-Hani, Rabia, Bakhteri

    Published 2016
    “…The proposed CNN is tested on a finger-vein database developed in-house that contains 50 subjects with 10 samples from each finger. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era by Wan Ismail, Hidayah, Abdelaziz, Berghout

    Published 2025
    “…Drawing on Qur’ānic exegesis, classical Islamic scholarship, and contemporary AI ethics, it contrasted natural intelligence with machine computation and highlighted the unique moral, spiritual, and teleological dimensions of humanity that cannot be replicated by algorithms. The article then applied the al-Istikhlāf framework to assess AI’s impact on identity, psychology, social relations, labour, and spiritual life. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry by Md Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2018
    “…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. By selecting an intricate wooden boat, Petalaindera, this study attempts to evaluate the efficiency of CV systems and compare it with the application of 3D laser scanning, which is known for its accuracy, efficiency and high cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry by Md. Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2017
    “…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. By selecting an intricate wooden boat, Petalaindera, this study attempts to evaluate the efficiency of CV systems and compare it with the application of 3D laser scanning, which is known for its accuracy, efficiency and high cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper