Search Results - (( java implication based algorithm ) OR ( policy implementation new algorithm ))
Search alternatives:
- policy implementation »
- implementation new »
- implication based »
- java implication »
- new algorithm »
-
1
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
2
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…This thesis aims at providing solutions to the problem by introducing an authorization framework, namely the Federated Grid Usage Control (FGUC) with a new ontology-based policy model, namely, the UCON based Access Control Ontology (UBACO), and a new grid authorization algorithm, namely, the Elimination of the Irrelevant Authorization Rules Set (EIARS). …”
Get full text
Get full text
Thesis -
3
-
4
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
5
Ethical considerations for equitable outcome-based education in the Metaverse: a qualitative study
Published 2025“…Semi-structured interviews were conducted with 11 XR experts across education, design, and policy domains. Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. …”
Get full text
Get full text
Get full text
Article -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
8
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…The mammogram database's initial test segment is critical for evaluating performance and determining the Area Under the Curve (AUC) to alias with medical policy. In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Ethical considerations for equitable outcome-based education in the metaverse: a qualitative study
Published 2025“…Semi-structured interviews were conducted with 11 XR experts across education, design, and policy domains. Thematic analysis revealed three primary ethical concerns: digital access inequities, bias in assessment algorithms, and privacy and data governance risk. …”
Get full text
Get full text
Get full text
Article -
10
Deterministic and stochastic inventory routing problems with backorders using artificial bee colony / Huda Zuhrah Ab Halim
Published 2019“…The DSIRP is then extended to handle backorder decisions (DSIRPB) which is the fourth variant of IRP studied. A new MILP for DSIRPB is formulated and used within the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Detecting space-time disease clusters with arbitrary shapes and sizes using a co-clustering approach
Published 2017“…To address this problem, a new algorithm is proposed, which uses a co-clustering strategy to detect prospective and retrospective space-time disease clusters with no restriction on shape and size. …”
Get full text
Get full text
Article -
12
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
13
Two-stage Heuristic for Primary School Timetabling Problem with Combined Classes Consideration
Published 2020“…Most of the primary school timetables are manually developed, which is extremely time-consuming. According to the new policy announced on 12th Dec 2017by the Ministry of Education (MoE) Malaysia, due to the shortage of teachers, combined-classes should be implemented in lowenrolment schools with fewer than 30 students. …”
Get full text
Get full text
Get full text
Article -
14
Legal Innovation in Religious Courts: The Potential Utilization of Artificial Intelligence (AI) in Resolving Contemporary Cases.
Published 2024“…The findings are expected to serve as a foundation for developing strategic policies to support AI implementation in Islamic legal systems, addressing societal needs in the contemporary era.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
The transmission dynamic of the COVID 19 outbreak : a predictive dashboard
Published 2021“…GUI for the dynamic transmission of the COVID 19 provides insight for the future outbreak, hence may help the respective stakeholders to propose the best policy of a new norm for all sectors. From the GUI, we can see that, when no or loose MCO is implemented or compliance of the public to the COVID 19 standard operating procedure (SOP), the infected case will increase rapidly up to 7.5 million. …”
Get full text
Get full text
Get full text
Article -
16
Development of Lifting-based VLSI Architectures for Two-Dimensional Discrete Wavelet Transform
Published 2010“…Then, based on the information gained from implementing the simulation program, a new approach for designing lifting-based VLSI architectures for 2-D forward DWT is introduced. …”
Get full text
Get full text
Thesis -
17
Poverty Classification in Indonesia Using BiGRU, BPNN, and Stacking AdaBoost Frameworks
Published 2024“…These findings underscore the critical role of machine learning in formulating effective policies for poverty alleviation and suggest that integrating multiple machine learning algorithm can significantly enhance decision-making processes. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.]
Published 2008“…This scheme will be deployed by combining the interference temperature multiple accesses (lTMA) on top of existing slotted/unslotted CSMAICA. To implement WSN integrated with cognitive radio techno 10gy, a new algorithm that provides access mechanism is needed to interactively working with sensor nodes hardware. …”
Get full text
Get full text
Research Reports -
19
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…A control mechanism is defined as well to control the non-cooperative behavior and fair-use policy among CMs. Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
Get full text
Get full text
Get full text
Thesis -
20
The transmission dynamic of the COVID 19 outbreak: A predictive dashboard
Published 2021“…GUI for the dynamic transmission of the COVID 19 provides insight for the future outbreak, hence may help the respective stakeholders to propose the best policy of a new norm for all sectors. From the GUI, we can see that, when no or loose MCO is implemented or compliance of the public to the COVID 19 standard operating procedure (SOP), the infected case will increase rapidly up to 7.5 million. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
