Search Results - (( initial filing based algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- using codification »
- codification using »
- using algorithm »
- initial filing »
- filing based »
-
1
A log file analysis technique using binary-based approach
Published 2014“…To validate the approach, performance comparison was also done against the popular Apriori algorithm. Initial result has shown enhancement in terms of execution time using the binary-based approach. …”
Get full text
Get full text
Article -
2
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…Remote file synchronization (RFS) is based on updating the outdated version of a file that resides on one machine to be similar to the new version of the updated file in another machine at a minimum computation time (cost). …”
Get full text
Get full text
Get full text
Thesis -
3
File integrity monitor scheduling based on file security level classification
Published 2011“…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…In addition to that, geolocation technique is implemented to provide a better information in terms of the complainant’s location, and together with the utilization of a rule-based algorithms based on priority to provide the local council a better insight on the issue. …”
Get full text
Get full text
Get full text
Book Section -
5
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
6
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
7
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…We proposed two novel search algorithms named QuickFlood and HybridFlood. QuickFlood combines two food-based searches; fooding and teeming. …”
Get full text
Get full text
Thesis -
8
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…The proposed fuzzy encoder algorithm used dynamic membership functions, which were built according to the size of the file. …”
Get full text
Get full text
Thesis -
9
SOLID-STATE MP3 PLAYER
Published 2005“… • A decoder to run a decompression algorithm that undoes the compression of the MP3 file and then a digital-to-analog converter turns the bytes back into waves…”
Get full text
Get full text
Final Year Project -
10
Instance matching framework for heterogeneous semantic web content over linked data environment
Published 2021“…Serialisation involves translating RDF data from of N-Triples file to Comma Separated Value (CSV) file format while pre-processing performs basic text filter. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
Get full text
Get full text
Thesis -
14
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…Moreover, the system periodically logs data into a CSV file for archival and analytical purposes. The proposed system is also designed to support a web-based interface, enabling remote access to the data across multiple devices via wireless networks. …”
Get full text
Get full text
Get full text
Article -
15
Parallelizing web scraping to improve performance and scalability
Published 2023“…The proposed solution requires user interaction to be configured and initialized. It employs a message queuing algorithm to divide scraping tasks into smaller units and utilizes multiple worker nodes for concurrent web data extraction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…Finally, the Buildings Footprint developed based on the algorithm was compared with the Buildings Footprint developed manually to assess the accuracy of the results. …”
Get full text
Get full text
Get full text
Thesis -
17
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
Get full text
Get full text
Final Year Project -
18
Pile Capacity Checking Tool based on Distributed Fibre Optic Sensing for Instrumented Pile Load Test
Published 2023Get full text
Get full text
Conference or Workshop Item -
19
Content-based indexing of low resolution documents
Published 2016“…The algorithm has the capability of reducing any shortcoming associated with normalisation in initial fusion technique. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis
