Search Results - (( data virtualization based algorithm ) OR ( variable generation using algorithm ))

Refine Results
  1. 1
  2. 2

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4
  5. 5

    An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms by Ullah, Arif

    Published 2021
    “…The proposed HBAC algorithm was tested and compared with other stateof-the-art algorithms on 200 to 2000 even tasks by using CloudSim on standard workload format (SWF) data sets file size (200kb and 400kb). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction by Ismanto, Edi, Ab Ghani, Hadhrami, Md Saleh, Nurul Izrin

    Published 2025
    “…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…As for this study, virtual area based is been used which applied to bathymetry data set that has been collected by using R2 Sonic 2020. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng by Cheong, Dianne L.M., Sia Abdullah, Nur Atiqah

    Published 2006
    “…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Finger triggered virtual musical instruments by Ng, Chee Kyun, Ee, Gee Keng, Noordin, Nor Kamariah, Fam, Jiang Gi

    Published 2013
    “…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
    Get full text
    Get full text
    Article