Search Results - (( java implementation phase algorithm ) OR ( managers intention based algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…On top of that software agent-based approach to big data management in IoT consider resource-constrained devices, allowing better resource management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…The proposed Enhanced Virtual Output Queues Management (EVOQM) algorithm provides an elevated fairness for unicast and multicast data in the network. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Study On AI-Driven Solutions for Cloud Security Platform by Menaga, Segar, Mohamad Fadli, Zolkipli

    Published 2024
    “…Cognitive tasks comprise integration, computational cost, and the ethical effect of the algorithm are identified and discussed. Real-world applications and possibilities for further development, such as federated learning and XAI, are also described in order to give recommendations for the effective application of AI-based cloud security. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Thyroid Insight: navigating disease data through interactive visualization with prediction by Osman, Mohd Nizam, Md Nasib, Azim, Sedek, Khairul Anwar, Othman, Nor Arzami, Maghribi, Mushahadah

    Published 2025
    “…The dashboard employs Microsoft Power BI for visualizations and the Random Forest algorithm for predictive modelling. Evaluation using the Technology Acceptance Model (TAM) with 35 respondents produced encouraging results across dimensions such as Perceived Ease of Use (4.28), Perceived Usefulness (4.61), Attitude (4.54), and Intention to Use (4.50). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa by Md Isa, Amalina Izzati

    Published 2018
    “…Inclusive with the design of UFLS is a new module referred as Load Shedding Module (LSM). Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak by Saqib Iqbal , Hakak

    Published 2018
    “…The searching of halves is achieved through two different algorithms based on the split approach and the parallel approach respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Gateway placement optimisation problem for mobile multicast design in wireless mesh networks by Sanni, Mistura L., Hassan Abdalla Hashim, Aisha, Anwar, Farhat, Naji, Ahmed Wathik

    Published 2012
    “…This formulation is different from existing works which considers only geographic positioning, load-balancing and interference-based placement. This novel formulation will serve as the basis for IGW placement and selection algorithm to address IGW deployment problem in a mobile multicast WMN architecture. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    User-guided Database Schema Generation For Naive Database Developers by Chyi, Wong Aun

    Published 2014
    “…Hence, almost every organization has employed a Database Management System (DBMS) to store and manage the huge amount of data. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
    Get full text
    Get full text
    Get full text
    Thesis