Search Results - (( data distribution from algorithm ) OR ( data distribution force algorithm ))

Refine Results
  1. 1

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…Wavelet decomposition is utilized to extract data information from texture data. In searching process, the data are retrieved based on data distribution. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Enhancing clustering algorithm with initial centroids in tool wear region recognition by Kasim, Nur Adilla, Nuawi, Mohd Zaki, Abdul Ghani, Jaharah, Ngatiman, Nor Azazi, Che Haron, Che Hassan, Muhammad Rizal

    Published 2020
    “…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Digital economy tax compliance model in Malaysia using machine learning approach by Raja Azhan Syah Raja Wahab, Azuraliza Abu Bakar

    Published 2021
    “…We conduct descriptive analytics to explore and extract a summary of data for initial understanding. Through a brief description of the descriptive model, the data distribution in a histogram shows that the information extracted can give a clear picture in influencing the results to classify digital economic tax compliance. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Study Of Aerodynamic Performances Of Gliders Using Computational Fluid Dynamics Analysis by Mustapa, Nabila

    Published 2019
    “…A Reynolds number range of 60,400 is specified as the flow properties based on the reference from the journal “Summary of Low-Speed Airfoil Data”. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…A user’s secret key to acquire data from the cloud will not be generated if there is a failure in one of the Attribute Authority’s nodes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Design and development of prototype robot gripper for object weight measurement by Almassri, Ahmed M. M.

    Published 2014
    “…The proposed work also includes the development of new algorithm for data extraction and signal conditioning analysis that will be loaded into the microcontroller system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication by Noraziah, Ahmad, Ainul Azila, Che Fauzi, Herawan, Tutut, Zailani, Abdullah

    Published 2015
    “…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The MIRR were computed based on the data extracted from the companies’ financial reports from 2010 to 2018. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A novel binary vote assignment grid quorum algorithm for distributed database fragmentation by Ainul Azila, Che Fauzi, Noraziah, Ahmad, Noriyani, Mohd Zin

    Published 2011
    “…Therefore, the storage, availability, and consistency are important issues to be addressed in order to allow distributed users efficiently and safely access data from many different sites. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. …”
    Article
  19. 19

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…The main and definitive target of routing protocols in Wireless Sensor Networks (WSN) is passing data from the sensor nodes to the sink in most energy efficient manner besides considering the accuracy of data. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Three phase fault algorithm in distribution system by using database approach and impedance based method by Shamsudin, N.H., Latiff, A.A., Abas, N., Mokhlis, Hazlie, Awalin, L.J.

    Published 2012
    “…The comparison is made through proposed algorithm with actual data acquired from the utility board. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item