Search Results - (( java implication based algorithm ) OR ( policy implementation new algorithm ))

Refine Results
  1. 1

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization by Maizura, Ibrahim

    Published 2019
    “…This thesis aims at providing solutions to the problem by introducing an authorization framework, namely the Federated Grid Usage Control (FGUC) with a new ontology-based policy model, namely, the UCON based Access Control Ontology (UBACO), and a new grid authorization algorithm, namely, the Elimination of the Irrelevant Authorization Rules Set (EIARS). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Ethical considerations for equitable outcome-based education in the Metaverse: a qualitative study by Mohamed Sofiadin, Aidrina

    Published 2025
    “…Semi-structured interviews were conducted with 11 XR experts across education, design, and policy domains. Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach by Othman, Khairulnizam

    Published 2022
    “…The mammogram database's initial test segment is critical for evaluating performance and determining the Area Under the Curve (AUC) to alias with medical policy. In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Ethical considerations for equitable outcome-based education in the metaverse: a qualitative study by Mohamed Sofiadin, Aidrina

    Published 2025
    “…Semi-structured interviews were conducted with 11 XR experts across education, design, and policy domains. Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Deterministic and stochastic inventory routing problems with backorders using artificial bee colony / Huda Zuhrah Ab Halim by Huda Zuhrah , Ab Halim

    Published 2019
    “…The DSIRP is then extended to handle backorder decisions (DSIRPB) which is the fourth variant of IRP studied. A new MILP for DSIRPB is formulated and used within the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Detecting space-time disease clusters with arbitrary shapes and sizes using a co-clustering approach by Ullah, S., Daud, H., Dass, S.C., Khan, H.N., Khalil, A.

    Published 2017
    “…To address this problem, a new algorithm is proposed, which uses a co-clustering strategy to detect prospective and retrospective space-time disease clusters with no restriction on shape and size. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Two-stage Heuristic for Primary School Timetabling Problem with Combined Classes Consideration by Sze, San Nah, Tan, See Yan, Chiew, Kang Leng, Tiong, Wei King

    Published 2020
    “…Most of the primary school timetables are manually developed, which is extremely time-consuming. According to the new policy announced on 12th Dec 2017by the Ministry of Education (MoE) Malaysia, due to the shortage of teachers, combined-classes should be implemented in lowenrolment schools with fewer than 30 students. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Legal Innovation in Religious Courts: The Potential Utilization of Artificial Intelligence (AI) in Resolving Contemporary Cases. by Sukindar, Sukindar, Hendrik Kusnianto, Kusnianto, Sarikun, Sarikun, Benhard Kurniawan, Pasaribu, Muhd Syahazizamir, Sahmat

    Published 2024
    “…The findings are expected to serve as a foundation for developing strategic policies to support AI implementation in Islamic legal systems, addressing societal needs in the contemporary era.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    The transmission dynamic of the COVID 19 outbreak : a predictive dashboard by Muhammad Fahmi Ahmad Zuber, Norhayati Rosli, Noryanti Muhammad

    Published 2021
    “…GUI for the dynamic transmission of the COVID 19 provides insight for the future outbreak, hence may help the respective stakeholders to propose the best policy of a new norm for all sectors. From the GUI, we can see that, when no or loose MCO is implemented or compliance of the public to the COVID 19 standard operating procedure (SOP), the infected case will increase rapidly up to 7.5 million. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of Lifting-based VLSI Architectures for Two-Dimensional Discrete Wavelet Transform by MOHAMED KOKO, IBRAHIM SAEED

    Published 2010
    “…Then, based on the information gained from implementing the simulation program, a new approach for designing lifting-based VLSI architectures for 2-D forward DWT is introduced. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Poverty Classification in Indonesia Using BiGRU, BPNN, and Stacking AdaBoost Frameworks by Khalisha, Ariyani, Silvia, Ratna, M., Muflih, Haldi, Budiman, Noor, Azijah, M.Rezqy, Noor Ridha

    Published 2024
    “…These findings underscore the critical role of machine learning in formulating effective policies for poverty alleviation and suggest that integrating multiple machine learning algorithm can significantly enhance decision-making processes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.] by Haron, Muhammad Adib, Jusoh, Mohamad Huzaimy, Abdul Aziz, Noor Hafizah, W. Muhamad, Wan Norsyafizan

    Published 2008
    “…This scheme will be deployed by combining the interference temperature multiple accesses (lTMA) on top of existing slotted/unslotted CSMAICA. To implement WSN integrated with cognitive radio techno 10gy, a new algorithm that provides access mechanism is needed to interactively working with sensor nodes hardware. …”
    Get full text
    Get full text
    Research Reports
  19. 19

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…A control mechanism is defined as well to control the non-cooperative behavior and fair-use policy among CMs. Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    The transmission dynamic of the COVID 19 outbreak: A predictive dashboard by Muhammad Fahmi, Ahmad Zuber, Norhayati, Rosli, Noryanti, Muhammad

    Published 2021
    “…GUI for the dynamic transmission of the COVID 19 provides insight for the future outbreak, hence may help the respective stakeholders to propose the best policy of a new norm for all sectors. From the GUI, we can see that, when no or loose MCO is implemented or compliance of the public to the COVID 19 standard operating procedure (SOP), the infected case will increase rapidly up to 7.5 million. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article