Search Results - (( framework implementation during algorithm ) OR ( java _ normalization algorithm ))

Refine Results
  1. 1

    Implementing case-based reasoning approach to framework documentation by Hajar M.J., Lee S.P.

    Published 2023
    “…This paper discusses and implements the case-based reasoning (CBR) approach to documenting a framework. …”
    Conference paper
  2. 2

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization by Maizura, Ibrahim

    Published 2019
    “…This thesis aims at providing solutions to the problem by introducing an authorization framework, namely the Federated Grid Usage Control (FGUC) with a new ontology-based policy model, namely, the UCON based Access Control Ontology (UBACO), and a new grid authorization algorithm, namely, the Elimination of the Irrelevant Authorization Rules Set (EIARS). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach by Kong, Zan Wai

    Published 2022
    “…The solution takes the layout of sensor nodes as input and generates a set of proposed IoT gateway locations. The framework generates the solution using genetic algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of task distribution algorithm for multi-robot coordination system by Sin, Han Bin

    Published 2022
    “…Besides, proper navigation techniques allow robots to avoid collisions and obstacles during task execution. Software such as Robot Operating System 2 (ROS2), Gazebo, ROS Visualization 2 (RViz2), and Robotics Middleware Framework (RMF) are utilized for the development and simulation of the project. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Moreover, the concealment includes patches for both smooth and nonsmooth areas. This framework is implemented in three key steps. The first step is devoted to detecting invisible patches. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy by Al-Dabbagh, Rawaa Dawoud, Neri, Ferrante, Idris, Norisma, Baba, Mohd Sapiyan

    Published 2018
    “…The proposed design framework provides readers with the main steps required to integrate any proposed meta-algorithm into parameter and/or strategy adaptation schemes.…”
    Get full text
    Get full text
    Article
  15. 15

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2018
    “…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
    Get full text
    Get full text
    Article
  17. 17

    Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2018
    “…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
    Get full text
    Get full text
    Article
  18. 18

    Runtime pluggable CPU scheduler for linux operating system by Al-Maweri, Nasr Addin Ahmed Salem

    Published 2010
    “…In this thesis a Linux based framework, Runtime Pluggable Scheduling Policies framework, has been proposed to allow switching between the scheduling policies on the CPU scheduler during run-time. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Detection and analysis of fake reviews on online service portal by Liong, Yong Xuan

    Published 2022
    “…Nowadays, the use of the World Wide Web and online service platforms has been quite popular, especially during the Covid-19 outbreak, which resulted in the implementation of lockdown, social isolation, and other preventive measures across the country. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement by Kadmin, Ahmad Fauzan

    Published 2023
    “…Therefore, the proposed framework is proven to be competitive with other established methods and can be used as a complete algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis