Search Results - (( development organization usage algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- development organization »
- organization usage »
- implication force »
- java implication »
- usage algorithm »
- force algorithm »
-
1
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
2
-
3
-
4
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…The impact of this problem becomes worst in a grid computing environment due to a large number of users and resource pools in the grid virtual organization (VO). This thesis aims at providing solutions to the problem by introducing an authorization framework, namely the Federated Grid Usage Control (FGUC) with a new ontology-based policy model, namely, the UCON based Access Control Ontology (UBACO), and a new grid authorization algorithm, namely, the Elimination of the Irrelevant Authorization Rules Set (EIARS). …”
Get full text
Get full text
Thesis -
5
-
6
Daily rainfall prediction using clonal selection algorithm
Published 2012“…There are three mains algorithm in AIS which are Clonal Selection Algorithm (CSA), Immune Network Algorithm and Negative Selection Algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…Using the existing lawnmower methods incur substantial costs in terms of time, accuracy and reliability. Therefore, the usage of a swarming robotic system is proposed. In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
Get full text
Get full text
Thesis -
8
Diagnosis security problems in cloud computing for business cloud
Published 2023“…Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security. � 2005 - 2016 JATIT & LLS. …”
Article -
9
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019“…Simulation results show that the proposed algorithm operates efficiently and effectively, and it provides a significantly improved performance over existing algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Feature selection in intrusion detection, state of the art: A review
Published 2016“…With the increase of internet usage the need of security for organizations network also increased. …”
Get full text
Get full text
Article -
11
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
Get full text
Get full text
Thesis -
12
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. …”
Get full text
Get full text
Article -
13
A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems
Published 2025“…The objectives of the multi-objective VRP addressed in this study are to minimise the total travel distance and the overall transportation cost. This study developed a hybrid metaheuristic algorithm involving grey wolf optimization, symbiotic organism search, and ant colony optimization (HMGSA) to address the multi-objective VRP. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Analysis of genetic data in for implementation of compression algorithm in Alzheimer's disease database
Published 2011“…The emergence of Web-Driven Database Applications (WDDA) has helped fulfil this requirement. Data is organized in databases for efficient storage and retrieval, while this information is made available to a wide audience through the usage of the Internet. …”
Get full text
Get full text
Research Reports -
15
A Comprehensive Study on CO2-CH4 Gas Separation Using γ-Alumina Membrane and Parameters Affecting Permeability and Separation Behavior
Published 2012“…The methodology is divided into two algorithms for permeability and separation perfomance respectively. …”
Get full text
Get full text
Final Year Project -
16
A krill herd behaviour inspired load balancing of tasks in cloud computing
Published 2017“…It can also organize the network clients using the fitting planning criteria. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Development of optimal energy management topology for battery electric vehicle with load segmentation
Published 2020“…The simulation tests in New European urban and extra urban driving (NEDC) has successfully verified the optimal energy consumption with a saving of 18.6% in energy or an increase of 28.5% (17.22 km) in driving range cumulatively. Subsequently, the development of three driving modes in PMS via power scheme management has successfully represented the diversity in driving between the most-comfortable-driving with highest-power-usage (Comfort Mode) and the least-comfort-driving with lowest-power-usage (Economic Mode). …”
Get full text
Get full text
Thesis -
18
Predictive analytics for pacemaker medical instrument stock management of Transmedic Healthcare
Published 2025“…The research applies the CRISP-DM methodology, examining current stock processes, and then collecting and cleansing historical data to develop Always Better Control (ABC) for stock analysis and predictive models using classification and also making a comparison between three algorithms, which are Naive Bayes, Random Forest and Decision Tree. …”
Get full text
Get full text
Student Project -
19
Predicting factors of library traffic for UiTMCTKKT Cendekiawan Library using predictive analytics / Azzatul Husna Abdul Aziz
Published 2025“…Key findings highlight the role of attributes, such as study year, week 13, week 10, week 14, age, week 12, open access, and Theory Of Reasoned Action, like student attitudes, intention, and subjective norms in influencing library usage and satisfaction. To ensure the practical utility of results, the developed Power BI dashboard was evaluated by three experts using the DATUS model. …”
Get full text
Get full text
Thesis -
20
