Search Results - (( based evaluation case algorithm ) OR ( based information services algorithm ))

Refine Results
  1. 1

    Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim by Lorpunmanee, Siriluck, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan

    Published 2008
    “…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…As a result, legitimate users are barred from utilizing the service from the MPLS network. This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  5. 5

    Automated call receiving and forwarding mechanism for supporting integrated disaster management system by Khamis, Norazlina, Lee , Chin Yang, Nordin, Azlin

    Published 2014
    “…Based on the evaluation, it is shown that the proposed algorithm are able to shorten the length of time between and incident happens and relevant agencies being dispatched to the event.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Implementation of case-based reasoning in help desk system by Tee, Shih Min

    Published 2019
    “…Besides of time consuming when solving customers’ problem, the personnel also faced inherently knowledge problem during help desk operation and difficulty in assessing abundant case data without a systematic system. The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Automated call receiving and forwarding mechanism for supporting integrated disaster management system by Norazlina Khamis, Lee, Azlin Nordin

    Published 2014
    “…Based on the evaluation, it is shown that the proposed algorithm are able to shorten the length of time between and incident happens and relevant agencies being dispatched to the event.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    CYCLOSTATIONARY FEATURES OF PAL TV AND WIRELESS MICROPHONE FOR COGNITIVE RADIO APPLICATIONS by ALHASSAN MOSSA, ALFATEH MOHAMMED

    Published 2010
    “…We focus on special case of Analog TV-PAL service and wireless microphone service as part 74 devices. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Revolutionizing video analytics: a review of action recognition using 3D by Jeddah, Yunusa Mohammed, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ibrahim, Adamu Abubakar

    Published 2024
    “…It also addresses the practicalities of implementing action recognition algorithms in real-world situations, which include tools like deep learning frameworks, pre-trained models, open-source libraries, cloud services, GPU acceleration, and evaluation metrics. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…Guaranteeing anonymous usage of location-based services however requires that the precise location information transmitted by a user cannot be easily used to identify the subject. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  14. 14

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  15. 15

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…FADRR is fully dynamic with fuzzy logic based approach and adaptive deadline-based scheme for various service class traffics in the base station (BS). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning. by Rajendran, Piraviendran, Othman, Muhaini

    Published 2024
    “…In conclusion, the study successfully identifies key features in warehouses routing, implements ACO and GA algorithms, and evaluates the performance based on achieved routes and distance.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Tensor-based factorial hidden markov model for Cyber-Physical-Social services by Lu, Zhixing, Yang, Laurence T., Azman, Azreen, Zhang, Shunli, Zhou, Fang

    Published 2025
    “…Furthermore, a tensor-based Viterbi algorithm is implemented with specific micro-services to improve prediction tasks. …”
    Get full text
    Get full text
    Get full text
    Article