Search Results - (( data distribution from algorithm ) OR ( user evaluation _ algorithm ))
Search alternatives:
- data distribution »
- distribution from »
- user evaluation »
- from algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…Data for the study was collected from university records, and algorithm performance was tested against predefined scheduling criteria. …”
Get full text
Get full text
Thesis -
3
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…However, the distributed and heterogeneous structure of these systems prevents them from taking advantage of these data for analytical purposes. …”
Get full text
Get full text
Thesis -
4
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations
Published 2023Conference Paper -
5
Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan
Published 2025“…The objective function of the algorithm minimizes the daily losses due to load shedding while ensuring a balanced and stable energy distribution to the end users. …”
Get full text
Get full text
Thesis -
6
Multi-objective algorithms for effective resource management in Edge-Fog-Cloud computing
Published 2023“…Simulations were conducted to evaluate the proposed algorithms compared to the PSO algorithm, Cloud-Fog Cooperation Scheduling algorithm, and Task offloading algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…Bio-inspired mechanisms are shown to be adaptive to environmental variations, robust and scalable, and require less computational and energy resources for designing secure routing algorithms for distributed optimization. In IoT network, the malicious intruders can exploit the routing system of the standardized routing protocol, e.g., RPL (The Routing Protocol for Low-Power and Lossy Networks), that does not observe the node’s routing behavior prior to data forwarding, and can launch various forms of routing attacks. …”
Get full text
Get full text
Get full text
Article -
8
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…Graphical method indicates the first difference of data distribution is a non-normal distribution. Then, Shapiro-Wilk statistical test confirmed that first difference of data distribution deviate from normal distribution. …”
Get full text
Get full text
Get full text
Article -
9
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…We design a service search algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
Get full text
Get full text
Thesis -
10
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…Both processes were sorted by algorithms on join attributes and the sorted relations was merged. …”
Get full text
Get full text
Thesis -
11
Analyzing customer reviews for ARBA Travel using sentiment analysis
Published 2025“…Three machine learning algorithms which are Naive Bayes, Logistic Regression, and Support Vector Machine, were implemented and evaluated using cross-validation and performance metrics such as accuracy, precision, recall, and F1- score. …”
Get full text
Get full text
Student Project -
12
Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH
Published 2021“…The probabilistic values of PV generation and load models are employed as the input data to the load flow analysis for the radial distribution network. …”
Get full text
Get full text
Thesis -
13
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…We design a service search I algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
Get full text
Get full text
Thesis -
14
Performance Analysis of Duty-Cycle Division Multiplexing for Optical Fiber Communication Systems
Published 2009“…In this study, the design of DCDM multiplexer and demultiplexer is improved. A new set of algorithm are developed for data recovery in the receiver. …”
Get full text
Get full text
Thesis -
15
Interferometric array planning using division algorithm for radio astronomy applications
Published 2017“…The algorithm is able to distribute the u-v plane more efficiently than GMRT with 49.77% overlapped samples. …”
Get full text
Get full text
Thesis -
16
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…Currently, the data transmission from sensor nodes to the cluster head uses a single hop which consumes more energy; thus, in this paper the enhancement of previous algorithm, which is MAP, the data transmission will use several paths to reach the cluster head. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Automatic generic process migration system in linux
Published 2012“…A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
18
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
Published 2018“…The verification of both experiments is made with current state-of-the-art algorithms. To validate the simulation results, an available dataset from a public datacentre was used. …”
Get full text
Get full text
Get full text
Thesis -
19
Multicast-unicast key management and data delivery method in wireless IPv6 networks
Published 2012“…Multicast is an efficient way of transmitting data simultaneously to a group of users. It has the advantage of reducing the required bandwidth of data delivery compared to unicast transmission. …”
Get full text
Get full text
Thesis -
20
Balanced femtocell model to enhance indoor coverage in LTE cellular network / Izwah Ismail
Published 2017“…Hence the Cognitive Femtocell (CogFem) network has been proposed based on the greedy algorithm to allow unlicensed users to exploit spectrum opportunities from primary systems to enhance the spectrum utilization and mitigate interference. …”
Get full text
Get full text
Thesis
