Search Results - (( policy implementation some algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- policy implementation »
- implementation some »
- data normalization »
- some algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
A hybrid model of system dynamics and genetic algorithm to increase crude palm oil production in Malaysia
Published 2018“…The hybrid of SD-GA through phase optimization process is capable to recommend policies that are plausible to be implemented to avoid unwarranted shock to the industry. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks
Published 2011“…The diversity of Internet traffic requires some classification and prioritisation since some traffic deserve much attention with less delay and loss compared to others. …”
Get full text
Get full text
Get full text
Thesis -
6
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…Findings reveal several search strategies implemented to improve the algorithm’s performance. …”
Get full text
Get full text
Article -
7
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…Findings reveal several search strategies implemented to improve the algorithm’s performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…The CPU scheduler uses different scheduling policies (algorithms) to manage such processes. Each scheduling policy has its own properties and suits specific applications or a specific environment. …”
Get full text
Get full text
Thesis -
9
Ant Colony Optimization for Solving Solid Waste Collection Scheduling Problems
Published 2009“…Formulating this real life problem into vehicle routing problem with stochastic demand model and using some designed algorithms to minimize operation cost of solid waste management. …”
Get full text
Get full text
Get full text
Article -
10
Ant colony optimization for solving solid waste collection scheduling problems
Published 2009“…Formulating this real life problem into vehicle routing problem with stochastic demand model and using some designed algorithms to minimize operation cost of solid waste management. …”
Get full text
Get full text
Get full text
Article -
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
12
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025“…Moreover, our algorithm for the blockchain implementation is hybrid because this approach incorporates all the best features of the private and public implementation due to the individual blocks containing feasible information rather than the entire history.…”
Get full text
Get full text
Get full text
Article -
13
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
14
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Dynamic investment model for the restructed power market in the presence of wind source
Published 2014“…The proposed framework has been implemented in the hypothetical restructured power market using the IEEE Reliability Test System. …”
Get full text
Get full text
Thesis -
16
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…However, some challenges are still outstanding due to the complexity of frequently changing the cryptographic enforcements of the owners’ access policies in the hosted cloud data files, and the key issuing process which poses computational and communicational overheads to data owners. …”
Get full text
Get full text
Thesis -
17
The transmission dynamic of the COVID 19 outbreak : a predictive dashboard
Published 2021“…Movement Control Order (MCO) and social distancing which have been implemented as control measures in Malaysia also affected many sectors. …”
Get full text
Get full text
Get full text
Article -
18
The transmission dynamic of the COVID 19 outbreak: A predictive dashboard
Published 2021“…Movement Control Order (MCO) and social distancing which have been implemented as control measures in Malaysia also affected many sectors. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Developing students' mathematical thinking: how far have we came?
Published 2015“…Evidence show that there has been vast misalignment between the intended curriculum (the one prescribed by policy makers), the implemented curriculum (the one that is actually carried out by teachers in their classrooms) and the attained curriculum (the one learnt by students or on what was examined). …”
Get full text
Get full text
Get full text
Inaugural Lecture -
20
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
