Search Results - (( knowledge using delay algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    RWP-NSGA II: reinforcement weighted probabilistic NSGA II for workload allocation in fog and internet of things environment by Ariffin, Ahmad Alauddin, Belhaouari, Samir Brahim, Raissouli, Hafsa

    Published 2024
    “…This method uses domain-specific knowledge to improve convergence and solution quality, resulting in reduced delay and better energy efficiency compared to traditional NSGA II and other evolutionary algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…This model was then simulated using the data collected to verify whether the model was operating effectively and can be used to achieve the objective of this research. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…This goes to the second objective of this research, in which to apply the algorithm to an App called “AR-Simulasi”, where it will be used to monitor the conveyor system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks by Latif, Suhaimi A, Masud, Mosharrof Hussain, Anwar, Farhat, Alam, Md Khorshed

    Published 2013
    “…In this regard,some critical issues like packet loss, packet reordering and delay need to be addressed efficiently. This paper aims to investigate the common scheduling algorithms both adaptive and non-adaptive solutions that have been using in networking and communication field. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Decision Support Approach to Computerize Maintenance Management System: Development and Implementation in Food Processing Industry by M.A., Burhanuddin, A.R., Ahmad, M.I., Desa, M.Y., Zeratul

    Published 2008
    “…In fact, these downtimes can be forecasted and managed more effectively if an organization takes preemptive measures using artificial intelligence techniques such as data mining, neural networks, genetic algorithm etc. …”
    Get full text
    Get full text
    Article
  9. 9

    Managing Fragmented Database Using BVAGQ-AR Replication Model by Ainul Azila, Che Fauzi, Noraziah, Ahmad, Tutut, Herawan, Z., Abdullah, Gupta, Ritu

    Published 2017
    “…Problem arises when the database is packed with data, but it has lacked of knowledge. If the unreasonable data is used in database replication, it will cause waste of data storage and delay the time taken for a replication process. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cognitive benefits of employing multiple AI voices as specialist virtual tutors in a multimedia learning environment by Liew, Tze Wei, Tan, Su Mae, Chan, Tak Jie, Tian, Yang, Ahmad, Faizan

    Published 2025
    “…Cognitive load was measured via a survey, while learning outcomes were assessed using immediate and 2-week delayed posttests covering retention, near-transfer, and far-transfer tasks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model by Noraziah, Ahmad, Wan Maseri, Wan Mohd, Ainul Azila, Che Fauzi

    Published 2015
    “…The problem is although we are packed with data, but we have lacked of knowledge. Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    BVAGQ-AR for Fragmented Database Replication Management by N., Ahmad, Ainul Azila, Che Fauzi, Sharifah Hafizah, Sy Ahmad Ubaidillah, Al-Kazemi, Basem, Odili, Julius Beneoluchi

    Published 2021
    “…Although we have been packed with data, we still have lacked of knowledge. Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Implementing universal priority DBA algorithm in PIC based EPON testbed by Radzi N.A.M., Din N.M., Al-Mansoori M.H., Majid M.S.A., Abdullah F.

    Published 2023
    “…To the best of our knowledge, this is the first time PIC is being used in EPON testbed for this purpose. …”
    Article
  14. 14

    Computerized Maintenance Management System for Food Processing Industries by M.A., Burhanuddin, A.R., Ahmad, M.I., Desa, M.Y., Zeratul

    Published 2007
    “…In fact, these downtimes can be forecasted and managed more effectively if an organization takes preemptive measures using artificial intelligence techniques such as data mining, neural networks, genetic algorithm etc. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…In this regards, a new method of Pico-satellite attitude control using Mamdani Fuzzy Logic Principles is introduced. …”
    Get full text
    Thesis
  18. 18
  19. 19

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…For high security, encryption is one of the methods used to protect data against leakage. CBC describes chaos theory as a measure of communication techniques and computational algorithms to perform different cryptographic tasks in a cryptographic system in specific physical dynamic systems operating in chaotic systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Ump Intelligent Chatbot Using Dialogflow by Joachim, Agostain

    Published 2022
    “…To create such a chatbot, a machine learning algorithm is used to learn the human language that is mainly used during such conversations. …”
    Get full text
    Get full text
    Undergraduates Project Papers