Search Results - (( using (vectorisation OR victimization) based algorithm ) OR ( java estimation using algorithm ))
Search alternatives:
-
1
An Automated System For Classifying Conference Papers
Published 2021“…The best classification model was then deployed to a web-based research conference system. The web-based system was developed using the Django web framework, based on a system architecture defined in this project called the Enhanced 3-Tier Web-based System with a Data Mining Layer. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm
Published 2016“…The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre. …”
Get full text
Get full text
Get full text
Article -
3
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…It can also be used to profile victim demographics based on victim characteristics. …”
Get full text
Get full text
Article -
4
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
6
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
Get full text
Get full text
Get full text
Monograph -
7
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The proposed method uses a rank accuracy estimation model to decide the rank-1 value to be applied for the decomposition. …”
Get full text
Get full text
Article -
8
The swarm-based exploration algorithm with expanded circle pattern for searching activities
Published 2015“…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
Get full text
Get full text
Get full text
Article -
9
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
10
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
12
Estimation of dielectric constant for various standard materials using microstrip ring resonator
Published 2017“…The differences in frequency shift were used in NetBeans IDE 8.1 algorithm of Java for dielectric constant calculation. …”
Get full text
Get full text
Article -
13
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
14
Development of a fall detection system based on neural network featuring IoT-Technology
Published 2021“…A body temperature and heartpulse monitoring device were developed for this system to provide the medical personnel additional information on the body condition of the fall victim. Using the latest IoT-technology, the system can be connected to the internet and provides a continuous and real-time monitoring capability. …”
Get full text
Get full text
Get full text
Article -
15
JTAGGER
Published 2006“…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
Get full text
Get full text
Final Year Project -
16
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Additionally, the results of the study indicated that the prediction model for workload performance evaluation using CBR that is optimized with Hash Search technique for determining workload data on Shortest Path analysis via the employment of Dijkstra algorithm can be useful for the prediction of incoming workload based on the status of the DBMS parameters. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Therefore, this research will propose the SEDF to overcome the problem of email spoofing. The algorithm use to match the word in the searching period in the mail header is based on The Boyer-Moore. …”
Get full text
Get full text
Research Reports -
18
Digital Framing and Reputation Crisis: A TikTok Framing Analysis of the Yai Mim–Sahara Case in the Context of Communication
Published 2026journal-article -
19
Development of eCall for Malaysia's automotive industries
Published 2019“…As such, collision detection and voice communication algorithm has been designed. For the collision detection, algorithm has been developed based on the data acquired from gyroscope and accelerometer. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Usually, phishing websites are created resembling legitimate sources to deceive victims. To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
