Search Results - (( data implication from algorithm ) OR ( data replication path algorithm ))

Refine Results
  1. 1

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases by Ainul Azila Che Fauzi, Ainul Azila, Noor Ashafiqa, Noor Ashafiqa, Asiah Mat, Asiah, Syerina Azlin Md Nasir, Syerina Azlin, A. Noraziah, Noraziah

    Published 2025
    “…Experimental results demonstrate that BVAC sustains fault tolerance, achieves cloud database replication efficiency, and sustains high data availability via multiple valid quorum paths. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2016
    “…The paper emphases on replicating data packets and distribute them to different relays. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2015
    “…The paper emphases on replicating data packets and distribute them to different relays. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Revolutionizing energy infrastructure: Automated route planning for underground transmission lines in Phnom Penh by Saing, Kimlin, Goh, Hui Hwang, Zhang, Dongdong, Dai, Wei, Kurniawan, Tonni Agustiono, Goh, Kai Chen

    Published 2024
    “…Multiple algorithms are evaluated to identify the most effective solution to this design’s inherent shortest-path problem. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model by Norhaida, Binti Hussain, Wai Shiang, Cheah, Wai Loke, Seng

    Published 2025
    “…The evaluation states that the existing agent-based steering model computes the complete set of collision-free paths with the least travel time among agents to make path decisions based on updated information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu by Md. Yunus, Aida Suraya

    Published 2001
    “…This study discusses the algorithms in multiplication involving decimal numbers from the perspectives of Form One students. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
    Get full text
    Get full text
    Article
  13. 13

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
    Get full text
    Get full text
    Article
  17. 17

    Prediction of payment method in convenience stores using machine learning by Pratondo, Agus, Novianty, Astri, Pudjoatmodjo, Bambang

    Published 2023
    “…The Random Forest algorithm was employed due to its robustness in handling complex, high-dimensional data, and its ability to provide reliable predictions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids by Chiaverini, Luca, Macdonald, David W., Hearn, Andrew J., Kaszta, Zaneta, Ash, Eric, Bothwell, Helen M., Can, Ozgun Emre, Channa, Phan, Clements, Gopalasamy Reuben *, Haidir, Iding Achmad, Kyaw, Pyae Phyoe, Moore, Jonathan H., Rasphone, Akchousanh, Tan, Cedric Kai Wei, Cushman, Samuel A.

    Published 2023
    “…Using felid presence-absence data from three study regions in Southeast Asia (mainland, Borneo and Sumatra), we tested the performances of SDMs by implementing four modelling frameworks: GLM and RF with bootstrapped and non-bootstrapped training data. …”
    Get full text
    Get full text
    Article
  19. 19

    Ethical implications of artificial intelligence in nursing care: a systematic literature review from an Islamic perspective by Wan Mamat, Wan Hasliza, Mahat, Nur Ain, Zainudin, Airul Azizan, Mohamad Shariff, Nurasikin, Syed Elias, Sharifah Munirah, Salah, Machouche, Jamaludin, Maizatul Aisha, Arini, Merita

    Published 2025
    “…The synthesis identified three primary ethical themes: 1) Safety, with subthemes of data privacy, misuse, algorithm bias, and physical safety; 2) Human element, focusing on trust, empathy, and human touch; and 3) Autonomy and informed decision-making. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Ahmad Salihin, Samsudin, Amir Izzani, Mohamed, Mohd Mawardi, Saari

    Published 2025
    “…Three distinct metaheuristic algorithms were investigated: Barnacles Mating Optimizer (BMO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Whale Optimization Algorithm (WOA), each integrated with CatBoost to optimize critical parameters including learning rate, tree depth, regularization, and bagging temperature. …”
    Get full text
    Get full text
    Get full text
    Article