Search Results - (( loading classification problems algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…The fact that CMS is dynamically generated is a problem on pages loading speed which is currently used in Drupal, Joomla, WordPress, and Agility CMS. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar by Anuar, Norhasnelly

    Published 2015
    “…This method will give the best result when clustering the overlapped data in load profile. PNN is a fast training process to do the classification activities. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Load balancing and server consolidation in cloud computing environments: a meta-study by Fadhil, Mohammed Alaa, Othman, Mohamed

    Published 2019
    “…Therefore, this paper surveys published load balancing algorithms that achieved by server consolidation via a meta-analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Service based load balance mechanism using software-defined networks / Ahmed Abdelaziz Abdelltif Osman by Ahmed Abdelaziz, Abdelltif Osman

    Published 2017
    “…To address aforementioned problems, we proposed a service based load balance (SBLB) mechanism using Software-Defined Networks (SDN). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. The literature contains various meta-heuristic algorithms with variable length searching. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. The literature contains various meta-heuristic algorithms with variable length searching. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Sara, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. The literature contains various meta-heuristic algorithms with variable length searching. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A systematic review on emperor penguin optimizer by Abdul Kader, Md., Kamal Z., Zamli, Ahmed, Bestoun S.

    Published 2021
    “…To-date, EPO has slowly gaining considerable momentum owing to its successful adoption in many broad range of optimization problems, that is, from medical data classification, economic load dispatch problem, engineering design problems, face recognition, multilevel thresholding for color image segmentation, high-dimensional biomedical data analysis for microarray cancer classification, automatic feature selection, event recognition and summarization, smart grid system, and traffic management system to name a few. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Cognitive load assessment through EEG: a dataset from arithmetic and stroop tasks by Nirabi, Ali, Abd Rahman, Faridah, Habaebi, Mohamed Hadi, Sidek, Khairul Azami, Yusoff, Siti Hajar

    Published 2025
    “…This study’s foundation is crucial for advancing stress classification research, with significant implications for cognitive function and well-being.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Feature extraction of power disturbance signal using time frequency analysis by Sihab, Norsabrina

    Published 2006
    “…Another problem is harmonics problem which is due to nonlinear loads and the source of fault is difficult to detect and diagnose. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis