Search Results - (( using function based algorithm ) OR ( framework implementation among algorithm ))

Refine Results
  1. 1

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…Second task is to determine the fitness function for the genetic algorithms. The third objective is to optimize the land use map using economic benefits. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Rule-based conflict resolution framework for Internet of Things device management in smart home environment by Perumal, Thinagaran, Sulaiman, Md. Nasir, Datta, Soumya Kanti, Ramachandran, Thinaharan, Chui, Yew Leong

    Published 2016
    “…In this paper, we present a rule-based conflict resolution framework using scheduling algorithm for managing heterogeneous systems in smart home environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Network calculus-based latency for time-triggered traffic under Flexible Window-Overlapping Scheduling (FWOS) in a Time-Sensitive Network (TSN) by Shalghum, Khaled M., Noordin, Nor Kamariah, Sali, Aduwati, Hashim, Fazirulhisyam

    Published 2021
    “…Accordingly, more relaxed scheduling algorithms are required. In this paper, we introduce the flexible window-overlapping scheduling (FWOS) algorithm that optimizes the overlapping among TT windows by three different metrics: the priority of overlapping, the position of overlapping, and the overlapping ratio (OR). …”
    Get full text
    Get full text
    Article
  4. 4

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…We implemented the EDRM framework in a simulated environment, using OPNET Modeler. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. Hashing function implementation have been using in this system as its cryptography algorithm. …”
    Get full text
    Get full text
    Monograph
  6. 6

    An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions by Gerhana, Yana Aditia

    Published 2025
    “…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Smart final year project archive system using laravel framework with email notification (SFYPAS) / Abidah Mat Taib by Mat Taib, Abidah, Mohd Shukri, Noor Atirah, Ahmad Zukri, Nurul Hidayah, Ghazali, Norlizawati

    Published 2020
    “…SFYPAS is developed using Laravel framework and the methodology used throughout the project is using Software Development Life Cycle (SDLC). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics by Zamani, Abu Sarwar, Hassan Abdalla Hashim, Aisha, Shatat, Abdallah Saleh Ali, Akhtar, Md. Mobin, Rizwanullah, Mohammed, Mohamed, Sara Saadeldeen Ibrahim

    Published 2024
    “…Moreover, the parameters present in the EL classifiers are optimized by using the same HFPBOA. Thefinal prediction output is obtained by averaging the weight function between the outputs of the NN, KNN, and fuzzy classifier. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan by Ahmat Ruslan, Fazlina

    Published 2015
    “…Further, after a careful investigation into the OLS algorithm, it was shown that the ERR technique which is an essential part of the algorithm to reach model parsimony, has led the resultant model to select an incorrect model terms albeit some improvement in model selection criteria and validation method adopted in this study. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam by Rustam, Ilham

    Published 2015
    “…Further, after a careful investigation into the OLS algorithm, it was shown that the ERR technique which is an essential part of the algorithm to reach model parsimony, has led the resultant model to select an incorrect model terms albeit some improvement in model selection criteria and validation method adopted in this study. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The first algorithm, named as Framework Initialization algorithm, is developed to initialize the framework and discovering the subsystems configured in order to derive the interoperation tasks. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb by Riyaz Ahamed , Ariyaluran Habeeb

    Published 2019
    “…Based on the outcome of the analysis, this research proposed a novel framework namely real-time anomaly detection based on big data technologies (RTADBDT), along with supporting implementation algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of task distribution algorithm for multi-robot coordination system by Sin, Han Bin

    Published 2022
    “…Hence, an effective task distribution algorithm is important to allocate tasks correctly among the robots with optimum cost and time utilization. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article