Search Results - (( java application bees algorithm ) OR ( dramatic implementation based algorithm ))

Refine Results
  1. 1

    Big data clustering using grid computing and ant-based algorithm by Ku-Mahamud, Ku Ruhana

    Published 2013
    “…However, there are many challenges in dealing with big data such as storage, transfer, management and manipulation of big data.Many techniques are required to explore the hidden pattern inside the big data which have limitations in terms of hardware and software implementation. This paper presents a framework for big data clustering which utilizes grid technology and ant-based algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…We have chosen four neighborhood based algorithms which are commonly used in optimization problems and divided them in newly implemented and re-implemented category. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementing case-based reasoning approach to framework documentation by Hajar M.J., Lee S.P.

    Published 2023
    “…This paper discusses and implements the case-based reasoning (CBR) approach to documenting a framework. …”
    Conference paper
  4. 4

    Mobile Travel Guide For Tourism by HUSEIN, Sukainah

    Published 2007
    “…Methodology that is practically adequate to be implemented in this system is Phased Development-based methodology. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Students’ attitude towards video-based learning: machine learning analysis with rapid software / Abdullah Sani Abd Rahman ... [et al.] by Abd Rahman, Abdullah Sani, Meutia, Rita, Hamid, Yusnaliza, Abdul Rahman, Rahayu

    Published 2022
    “…The recent computer and Internet technologies have dramatically impacted many facets of education. There has been a rapid rise mainly since the COVID19 pandemic in the use of video-based learning implemented via online classroom setting. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A Focal load balancer based algorithm for task assignment in cloud environment by Mohammed, Mostafa Abdulghfoor, Hasan, Raed Abdulkareem, Ahmed, Munef Abdullah, Tapus, Nicolae, Shnan, Marwan Ali, Khaleel, M. K., Ali, Ahmed H.

    Published 2019
    “…Comparisons with the krill-LB and agent-based algorithms show that the new system provides a reduction in average wait time, a significant increase in throughput, and a dramatic reduction in CPU time consumption.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An automatic diacritization algorithm for undiacritized Arabic text by Zayyan, Ayman Ahmad Muhammad

    Published 2017
    “…Moreover, this research is to implement and evaluate the accuracy of the algorithm for dialectal Arabic text. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A technical framework analysis of digital twin control algorithms for HVAC-BMS Integration and implementation challenges for Malaysian green buildings by Norazam, Nur Muhamad Afif, Mohd Noh, Hamidun, Ishak, Mohd Hafizal, Zulkefli, Nursyazwani, Jumali, Muhammad Arif, Brown, Jeffery Jep

    Published 2025
    “…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A new parameterized architectural design for SENSE reconstruction by Siddiqui, M.F., Reza, A.W., Kanesan, J., Omer, H.

    Published 2014
    “…Hardware platforms for specific reconstruction algorithms dramatically increase the power efficiency and decrease the execution time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Benchmarking of Bat-inspired Interaction Testing Strategy by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B.

    Published 2016
    “…T-way interaction testing has been extensively exploited resulting into many prototypes strategy implementations. Recently, there are growing interests for adopting optimization algorithms as the basis of the newly developed strategies contributing to the new and upcoming search based software testing (SBST) area of research. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    High-Speed Implementations Of Fractal Image Compression For Low And High Resolution Images by Saad, Abdul Malik Haider Yusef

    Published 2018
    “…The major drawback of FIC is that it is a time consuming algorithm, especially when a full search is attempted. …”
    Get full text
    Get full text
    Thesis
  14. 14

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
    Get full text
    Get full text
    Thesis
  15. 15

    QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics by Abbas, Sharafal-Deen Abdulkadhum

    Published 2016
    “…The algorithm mentioned in the study reduces the computational complexity problem which is one of the main issues that accompany currently used tap filter algorithms, such as (LMS) and (RLS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Beyond the classroom: digital language learning in the Malaysian context by Mohd Nadzrin, Nur Amelia, Md Yunus, Melor, Mohd Said, Nur Ehsan

    Published 2024
    “…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Simulation of quantum growing network / Ong Boon Teong by Ong , Boon Teong

    Published 2003
    “…At such scales, the current model of computation, based on a mathematical idealization known as the Universal Turing Machine, is simply invalid. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of low-overhead soft error mitigation technique for safety critical neural networks applications by Khalid Adam, Ismail Hammad

    Published 2021
    “…Deep Neural Networks (DNNs) have been widely applied in healthcare applications. DNN-based healthcare applications are safety-critical systems that require highreliability implementation due to a high risk of human death or injury in case of malfunction. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…The Whale Optimisation Algorithm (WOA), Harris Hawks Optimisation (HHO) Algorithm, Lévy Flight WOA (LFWOA) and the Opposition-Based Learning of HHO (OBL-HHO) were proposed to simulate the initial model’s response and optimise the Klang Gate Dam (KGD) release operation with observed inflow, water level (storage), release, and evaporation rate (loss). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis