Search Results - (( initial filing based algorithm ) OR ( using codification using algorithm ))

Refine Results
  1. 1

    A log file analysis technique using binary-based approach by Fageeri, S.O., Ahmad, R., Baharudin, B.

    Published 2014
    “…To validate the approach, performance comparison was also done against the popular Apriori algorithm. Initial result has shown enhancement in terms of execution time using the binary-based approach. …”
    Get full text
    Get full text
    Article
  2. 2

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…Remote file synchronization (RFS) is based on updating the outdated version of a file that resides on one machine to be similar to the new version of the updated file in another machine at a minimum computation time (cost). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…In addition to that, geolocation technique is implemented to provide a better information in terms of the complainant’s location, and together with the utilization of a rule-based algorithms based on priority to provide the local council a better insight on the issue. …”
    Get full text
    Get full text
    Get full text
    Book Section
  5. 5

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  7. 7

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…We proposed two novel search algorithms named QuickFlood and HybridFlood. QuickFlood combines two food-based searches; fooding and teeming. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…The proposed fuzzy encoder algorithm used dynamic membership functions, which were built according to the size of the file. …”
    Get full text
    Get full text
    Thesis
  9. 9

    SOLID-STATE MP3 PLAYER by Abdul Rahman, Mohd Faizul Fatan

    Published 2005
    “… • A decoder to run a decompression algorithm that undoes the compression of the MP3 file and then a digital-to-analog converter turns the bytes back into waves…”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Instance matching framework for heterogeneous semantic web content over linked data environment by Mansir, Abubakar

    Published 2021
    “…Serialisation involves translating RDF data from of N-Triples file to Comma Separated Value (CSV) file format while pre-processing performs basic text filter. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus by Megat Yunus, Puteri Nor Ashikin

    Published 2023
    “…This thesis presents a new algorithm for output prediction and online monitoring in a Grid-Connected Photovoltaic (GCPV) system based on an artificial neural network. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Mat Jusoh, Mohammad Azzeim, Amirudin, Irfan Syahmi Rusyaidi, Zainalabidin, Ashraf

    Published 2025
    “…Moreover, the system periodically logs data into a CSV file for archival and analytical purposes. The proposed system is also designed to support a web-based interface, enabling remote access to the data across multiple devices via wireless networks. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Parallelizing web scraping to improve performance and scalability by Na, Yi Chun

    Published 2023
    “…The proposed solution requires user interaction to be configured and initialized. It employs a message queuing algorithm to divide scraping tasks into smaller units and utilizes multiple worker nodes for concurrent web data extraction. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques by Jifroudi, Hamidreza Maskani

    Published 2021
    “…Finally, the Buildings Footprint developed based on the algorithm was compared with the Buildings Footprint developed manually to assess the accuracy of the results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…The algorithm has the capability of reducing any shortcoming associated with normalisation in initial fusion technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
    Get full text
    Get full text
    Thesis