Search Results - (( data evaluation method algorithm ) OR ( data virtualization based algorithm ))

Refine Results
  1. 1
  2. 2

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…We evaluated the performance of augmenting the 3D object using the techniques, vision-based, and incorporating the sensor data using the video data. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Resource scheduling algorithm with load balancing for cloud service provisioning by Priya, V., Sathiya Kumar, C., Kannan, R.

    Published 2019
    “…Simulations were conducted to evaluate the effectiveness using Cloudsim simulator in cloud data centers and results shows that the proposed method achieves better performance in terms of average success rate, resource scheduling efficiency and response time. …”
    Get full text
    Get full text
    Article
  5. 5

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Each image went through the embedding process by the evaluated algorithms. This enhanced image data numbers then went through Logistic Regression as a classifier. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…Meanwhile, the effectiveness test shows that this VR product can improve learning outcomes better than traditional learning methods. Overall, the VR products developed have proven to be practical and effective in learning programming algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Optimising cloud computing performance with an enhanced dynamic load balancing algorithm for superior task allocation by Zhanuzak, Raiymbek, Ala'anzy, Mohammed Alaa, Othman, Mohamed, Algarni, Abdulmohsen

    Published 2024
    “…Additionally, if a VM cannot meet a cloudlet's deadline, the algorithm redirects the cloudlet to a secondary data centre and reconfigures CPU resources among VMs to ensure optimal allocation. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud by Farid, Mazen, Latip, Rohaya, Hussin, Masnida, Abdul Hamid, Nor Asilah Wati

    Published 2021
    “…FITSW duplicates each sub-task three times, uses an intermediate data decision-making mechanism, and then employs a deadline partitioning method to determine sub-deadlines for each sub-task. …”
    Get full text
    Get full text
    Article
  11. 11

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Performance of Glycemic Control Protocol and Virtual Trial by Fatanah, M. Suhaimi, Ummu Kulthum, Jamaludin, Normy Norfiza, A. Razak, Azrina, Md Ralib, Mohd Basri, Mat Nor

    Published 2017
    “…Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification by Hussain, A., Hussain, S.S., Uddin, M.M., Zubair, M., Kumar, P., Umair, M.

    Published 2022
    “…It includes, but is not limited to, Virtual Reality, Augmented Reality, Voice Control Systems, EEG-based systems, etc. …”
    Get full text
    Get full text
    Article
  14. 14

    Performance of glycemic control protocol and virtual trial by Suhaimi F.M., Jamaludin U.K., Razak N.N., Ralib A.M., Nor M.B.M.

    Published 2023
    “…Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
    Article
  15. 15

    Performance of glycemic control protocol and virtual trial by Suhaimi, Fatanah M., Abdul Razak, Normy Norfiza, Md Ralib, Azrina, Mat Nor, Mohd Basri

    Published 2017
    “…Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Revolutionizing video analytics: a review of action recognition using 3D by Jeddah, Yunusa Mohammed, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ibrahim, Adamu Abubakar

    Published 2024
    “…As an interdisciplinary field, the 3D video action recognition model interprets human actions in three-dimensional video data using approaches such as pose-based, volumetric, motionbased, and hybrid methods. 3D video action recognition finds application in surveillance, sports analysis, human-computer interaction, healthcare, robotics, and augmented/virtual reality. …”
    Get full text
    Get full text
    Article
  17. 17

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…The proposed Enhanced Virtual Output Queues Management (EVOQM) algorithm provides an elevated fairness for unicast and multicast data in the network. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…The complete project is carried out in the CARLA simulator to determine how to operate in discrete action space using Deep Reinforcement Learning (DRL) algorithms. Gathering and evaluating a large amount of data is time and effortintensive. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…Attempts have been made to resolve all of these issues by using several methods such as: full text searching, text indexing, a database schema management, database data model, and query-based techniques. …”
    Get full text
    Get full text
    Thesis