Search Results - (( data evaluation method algorithm ) OR ( data virtualization design algorithm ))
Search alternatives:
- data virtualization »
- method algorithm »
- design algorithm »
- data evaluation »
-
1
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
2
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…The main objective of this project is to design a system that detects motion gesture of a virtual heart in medical imaging environment. …”
Get full text
Get full text
Academic Exercise -
3
Optimising cloud computing performance with an enhanced dynamic load balancing algorithm for superior task allocation
Published 2024“…Additionally, if a VM cannot meet a cloudlet's deadline, the algorithm redirects the cloudlet to a secondary data centre and reconfigures CPU resources among VMs to ensure optimal allocation. …”
Get full text
Get full text
Get full text
Article -
4
Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks
Published 2012“…The proposed Enhanced Virtual Output Queues Management (EVOQM) algorithm provides an elevated fairness for unicast and multicast data in the network. …”
Get full text
Get full text
Thesis -
5
Performance of Glycemic Control Protocol and Virtual Trial
Published 2017“…Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
Get full text
Get full text
Get full text
Article -
6
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
7
Performance of glycemic control protocol and virtual trial
Published 2023“…Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
Article -
8
Virtual Models for Real-World Learning: The Development and Evaluation of a Patient Simulator for Eye Disability Diagnosis
Published 2024thesis::master thesis -
9
Performance of glycemic control protocol and virtual trial
Published 2017“…Virtual trials method is used to simulate the controller algorithm on a virtual patient with feed variation factor. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
Get full text
Get full text
Thesis -
11
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
12
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
13
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…In result, various encryption algorithms coming into being. Cryptographic algorithm has become one of the most essential features of embedded system design. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
15
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In this research, the focus is on cloth textures. The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. …”
Get full text
Get full text
Thesis -
16
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
17
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…In result, various encryption algorithms coming into being. Cryptographic algorithm has become one of the most essential features of embedded system design. …”
Get full text
Get full text
Get full text
Article -
18
Case Slicing Technique for Feature Selection
Published 2004“…Since the 1960s, many algorithms for data classification have been proposed. …”
Get full text
Get full text
Thesis -
19
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis
