Search Results - (( using function a algorithm ) OR ( data virtualization based algorithm ))

Refine Results
  1. 1
  2. 2

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…The first part of the algorithm aims to build a rotation table using hash function within scramble phase and descramble phase to generate a scrambled (rotated) image and the retrieved image. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Estimation of Response Transfer Functions of Offshore Structures Using the Time-Varying ARX Model by Yazid, Edwar, Liew, M. S., Parman, Setyamartana, Kurian, V.J.

    Published 2013
    “…Here, we outline a practical algorithm for TVARX model which uses expectation-maximization (EM) algorithm based on Kalman smoother to generate the transfer function. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Mat Jusoh, Mohammad Azzeim, Amirudin, Irfan Syahmi Rusyaidi, Zainalabidin, Ashraf

    Published 2025
    “…This motivates our initiative to develop a simulation of a cross-belt conveyor system. The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification by Hussain, A., Hussain, S.S., Uddin, M.M., Zubair, M., Kumar, P., Umair, M.

    Published 2022
    “…In this connection, a recent dataset, â��Mocap Hand Postures Data Set,â�� has been opted to employ the different variants of the machine learning algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Interpretation of machine learning model using medical record visual analytics by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah

    Published 2021
    “…This paper analyzed several visual analytics ap- proach instantiated in machine learning algorithm for medical record analytics. The motivation of this paper is to allow medical experts to understand the inter- pretation of a black box machine learning model in predicting medical outcome. …”
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…The transfer function model also makes use of a continuous-time transfer function. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Online media as a price monitor: Text analysis using text extraction technique and jaro-winkler similarity algorithm by Nurcahyawati, Vivine, Mustaffa, Zuriani

    Published 2020
    “…The texts analyzed were taken from three online media, namely Twitter, Liputan6.com, and Detik.com. It was analyzed using text extraction techniques and the application of the Jaro-Winkler algorithm to find commodity prices in the text collection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…Potential actions must be taken based on prior experiences using a trial and error process. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Mobile agent based multi-layer security framework for cloud data centers by Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi

    Published 2015
    “…Methods/Analysis:The proposed framework is divided into four layers with each performing authentication, verification and integrity at different levels of communication between entities. An algorithm is used to check and analyze the validity and functionality of each layer. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Multi-objective scheduling of MapReduce jobs in big data processing by Hashem, Ibrahim Abaker Targio, Anuar, Nor Badrul, Marjani, Mohsen, Gani, Abdullah, Sangaiah, Arun Kumar, Sakariyah, Adewole Kayode

    Published 2018
    “…Second, a scheduling algorithm using earliest finish time scheduling that considers resource allocation and job scheduling in the cloud is proposed. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20