Search Results - (( data distribution from algorithm ) OR ( user evaluation _ algorithm ))

Refine Results
  1. 1
  2. 2

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…Data for the study was collected from university records, and algorithm performance was tested against predefined scheduling criteria. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…However, the distributed and heterogeneous structure of these systems prevents them from taking advantage of these data for analytical purposes. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan by Adlan, Muhammad Asyraaf

    Published 2025
    “…The objective function of the algorithm minimizes the daily losses due to load shedding while ensuring a balanced and stable energy distribution to the end users. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multi-objective algorithms for effective resource management in Edge-Fog-Cloud computing by Saif, Faten Ameen Mohammed

    Published 2023
    “…Simulations were conducted to evaluate the proposed algorithms compared to the PSO algorithm, Cloud-Fog Cooperation Scheduling algorithm, and Task offloading algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…Bio-inspired mechanisms are shown to be adaptive to environmental variations, robust and scalable, and require less computational and energy resources for designing secure routing algorithms for distributed optimization. In IoT network, the malicious intruders can exploit the routing system of the standardized routing protocol, e.g., RPL (The Routing Protocol for Low-Power and Lossy Networks), that does not observe the node’s routing behavior prior to data forwarding, and can launch various forms of routing attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering by Rosbi, Sofian, Abu Bakar, Nashirah

    Published 2017
    “…Graphical method indicates the first difference of data distribution is a non-normal distribution. Then, Shapiro-Wilk statistical test confirmed that first difference of data distribution deviate from normal distribution. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…We design a service search algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…Both processes were sorted by algorithms on join attributes and the sorted relations was merged. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Analyzing customer reviews for ARBA Travel using sentiment analysis by Abdullah, Nurulain

    Published 2025
    “…Three machine learning algorithms which are Naive Bayes, Logistic Regression, and Support Vector Machine, were implemented and evaluated using cross-validation and performance metrics such as accuracy, precision, recall, and F1- score. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH by Norhafidzah, Mohd Saad

    Published 2021
    “…The probabilistic values of PV generation and load models are employed as the input data to the load flow analysis for the radial distribution network. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…We design a service search I algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance Analysis of Duty-Cycle Division Multiplexing for Optical Fiber Communication Systems by Mahdiraji, Ghafour Amouzad

    Published 2009
    “…In this study, the design of DCDM multiplexer and demultiplexer is improved. A new set of algorithm are developed for data recovery in the receiver. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…The algorithm is able to distribute the u-v plane more efficiently than GMRT with 49.77% overlapped samples. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network by Wan Isni Sofiah, Wan Din, Asyran Zarizi, Abdullah, Razulaimi, Razali, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Eh Phon, Danakorn Nincarean, Cik Feresa, Mohd Foozy

    Published 2019
    “…Currently, the data transmission from sensor nodes to the cluster head uses a single hop which consumes more energy; thus, in this paper the enhancement of previous algorithm, which is MAP, the data transmission will use several paths to reach the cluster head. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…The verification of both experiments is made with current state-of-the-art algorithms. To validate the simulation results, an available dataset from a public datacentre was used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Multicast-unicast key management and data delivery method in wireless IPv6 networks by Zare Anari, Abbas Mehdizadeh

    Published 2012
    “…Multicast is an efficient way of transmitting data simultaneously to a group of users. It has the advantage of reducing the required bandwidth of data delivery compared to unicast transmission. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Balanced femtocell model to enhance indoor coverage in LTE cellular network / Izwah Ismail by Ismail, Izwah

    Published 2017
    “…Hence the Cognitive Femtocell (CogFem) network has been proposed based on the greedy algorithm to allow unlicensed users to exploit spectrum opportunities from primary systems to enhance the spectrum utilization and mitigate interference. …”
    Get full text
    Get full text
    Thesis