Search Results - (( course estimation path algorithm ) OR ( related information sharing algorithm ))

Refine Results
  1. 1
  2. 2

    Multiview Laplacian semisupervised feature selection by leveraging shared knowledge among multiple tasks by Krishnasamy, Ganesh, Paramesran, Raveendran

    Published 2019
    “…Recently, considerable advancement has been achieved in semisupervised multitask feature selection methods, which they exploit the shared information from multiple related tasks. Besides, these algorithms have adopted manifold learning to leverage both the unlabeled and labeled data since its laborious to obtain adequate labeled training data. …”
    Get full text
    Get full text
    Article
  3. 3

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…Recently, considerable advancement has been achieved in semi-supervised multi-task feature selection algorithms, where they have exploited the shared information from multiple related tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Image Retrieval System (RGB) by Zahir, Zarith Suraya

    Published 2005
    “…Thus, this project showed that images retrieved by using the global color histogram may not be semantically related even though they share similar color distribution in some results. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…Access nodes are equipped with a fixed transmitter and fixed receiver for the control information exchange. In this research, the management of the shared network resources has been researched extensively with the intention to enhance the performance of the network and overcome the MAC protocols related limitations. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust by Meddour, Houcine

    Published 2016
    “…The results also revealed that the direct relationships between organizational capacity (human resource practices), and organizational environment (information technology, networks) were significantly related to trust. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Over the last two decades, researchers have been trying to create algorithms to measure end-to-end available bandwidth and other bandwidth-related metrics accurately, quickly, and without affecting the traffic of the path. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Ensemble Filter for Indoor Positioning Technology of Mobile Home Service with Agile iBeacon Deployment by Abu-AlSondos, Ibrahim A, Salameh, Anas A., Mohd Nawi, Mohd Nasrun, Deraman, Rafikullah

    Published 2023
    “…Based on this, a system for mobile home service robots was developed, and simulation tests were performed to assess the accuracy of node locating, node reception and arrival times, the best level of route planning, and navigation and path estimation errors in both absolute and comparative terms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Flexible content authorization using digital rights management in cloud computing / Ali Hussain by Ali , Hussain

    Published 2021
    “…And more prominent in online social media platform due to their flexible sharing feature which can make false information viral in negligible time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The authors introduce Integrative Information Management Architecture (IIMA) running on collaboration algorithms which create semi automated intermediary processes to support management team address integration challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Prospective use of bloom filter and muxing for information centric network caching by Abdullahi, Ibrahim, Hassan, Suhaidi, Arif, Suki

    Published 2015
    “…Information dissemination as the main objective of setting up the Internet has seen different folds to improve its course.Information centric networking (ICN) has been introduced with the aim of curtailing some future challenges posed at the traditional Internet in the nearest future.ICN advantage of caching chunks of information on-path and off-path of the network stands the paradigm out as an alternative shift from host centric network to name centric.ICN caching approach can thereby significantly reduce amount of times a host is visited.Bloom Filter with its advantage of fast searching and false positivity characteristics are seen as form of message retrieval practice to improve interest serving on the network.This paper analyzed the advantages of vending and adopting Bloom Filters and Muxing as research directions to minimize excessive bandwidth consumption, lesser delays, prompt delivery of information, higher throughput and the ability to share information from troubled stations.Concepts are proposed and wider algorithms are pointed out to increase the overall ICN framework as related to caching and other network services.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    The design and implementation of Malaysian indigenous herbs knowledge management system based on ontology model by Sahri, Zulazeze, Abd Aziz, Muhd Eizan Shafiq, Ramli, Nazirah, Canda, Roger

    Published 2016
    “…The transformation from OWL to Relational database is based on the OWL2DB algorithm guideline will be further discussed in this research.Assisted by the System Development Life Cycle (SDLC) methodology, MiHerbs is expected to help herbal research agencies, private sector and government to store and share their herbal related information via the system to provide an ease information access to public or even people around the world.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A survey of exploratory search systems based on LOD resources by Jacksi, Karwan, Dimililer, Nazife, Zeebaree, Subhi R. M.

    Published 2015
    “…The fact that the existing Web allows people to effortlessly share data over the Internet has resulted in the accumulation of vast amounts of information available on the Web.Therefore, a powerful search technology that will allow retrieval of relevant information is one of the main requirements for the success of the Web which is complicated further due to use of many different formats for storing information. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2013
    “…Key exchange or key establishment is any process in cryptography by which users are able to share or exchange a secret key. The problem on the key exchange is how to exchange any keys or information so that no third party can obtain a copy. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A conceptual anonymity model to ensure privacy for sensitive network data by Arafat, N.H.M., Pramanik, Md Ileas, Abu Jafar, Md Muzahid, Lu, Bibo, Jahan, Sumaiya, Murad, Saydul Akbar

    Published 2021
    “…The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The proposed method achieves a 75% enhancement in energy efficiency compared to conventional Orthogonal Multiple Access (OMA) and an 11% improvement over benchmark NOMA algorithms. Additionally, it reduces outage probability by 25% and 10% relative to OMA and existing NOMA algorithms, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis