Search Results - (( based application during algorithm ) OR ( based application among algorithms ))*
Search alternatives:
- application during »
- based application »
- application among »
- during algorithm »
- among algorithms »
-
1
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
2
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
3
-
4
Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot...
Published 2021“…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
Get full text
Get full text
Get full text
Article -
5
Multi selection control algorithm in examination invigilation management system (ExIMS) for exchanging invigilation duties among invigilators at UiTM Pulau Pinang branch / Jamal Ot...
Published 2021“…Nevertheless, despite the excellent planning of invigilation duties assignment, it cannot make everybody satisfied. Thus, a web-based application system named Examination Invigilation Management Systems (ExIMS) has been developed using the System Development Life Cycle (SDLC) waterfall model methodology to meet the need of invigilation duties exchanged among invigilators or applicants. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
-
9
-
10
Analysing machine learning models to detect disaster events using social media
Published 2023text::Thesis -
11
-
12
-
13
BSKF: Binary Simulated Kalman Filter
Published 2015Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Distance Evaluated Simulated Kalman Filter for Combinatorial Optimization Problems
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking
Published 2016“…Among artificial intelligent algorithms used in MPPT are neural network, fuzzy logic control (FLC) and genetic algorithm. …”
Get full text
Get full text
Thesis -
20
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…A multi-date post-classification comparison algorithm was used to determine LULC changes in two intervals, 1986-1990, and 1990-2000. …”
Get full text
Get full text
Thesis
