Zobrazeno 1 - 10
of 39
pro vyhledávání: '"San Nah Sze"'
Autor:
Emily Sing Kiang Siew, San Nah Sze, Say Leng Goh, Graham Kendall, Nasser R. Sabar, Salwani Abdullah
Publikováno v:
IEEE Access, Vol 12, Pp 41479-41498 (2024)
Exam timetabling is a prominent topic in academic administration management as it ensures the effective utilization of resources and satisfies the requirements and preferences of stakeholders, which leads to a productive academic environment, contrib
Externí odkaz:
https://doaj.org/article/b4d98080d6c8400c88adce6f280e34ff
Publikováno v:
IEEE Access, Vol 10, Pp 56504-56524 (2022)
This paper presents an overview of recent advances for the Nurse Rostering Problem (NRP) based on methodological papers published between 2012 to 2021. It provides a comprehensive review of the latest solution methodologies, particularly computationa
Externí odkaz:
https://doaj.org/article/a2d3c9e149824170840992a4a65f693b
Publikováno v:
IEEE Access, Vol 10, Pp 69591-69604 (2022)
In this paper, we are addressing the NP-hard nurse rostering problem utilizing a 2-stage approach. In stage one, Monte Carlo Tree Search (MCTS) and Hill Climbing (HC) are hybridized in finding a feasible solution (satisfying all the hard constraints)
Externí odkaz:
https://doaj.org/article/ceca8c36e8d546069c90355dd29648fa
Publikováno v:
IEEE Access, Vol 9, Pp 106515-106529 (2021)
The timetabling problem is common to academic institutions such as schools, colleges or universities. It is a very hard combinatorial optimisation problem which attracts the interest of many researchers. The university course timetabling problem (UCT
Externí odkaz:
https://doaj.org/article/59ffca191e6547a1ad9da0074e7b9a15
Publikováno v:
IEEE Access, Vol 9, Pp 106515-106529 (2021)
The timetabling problem is common to academic institutions such as schools, colleges or universities. It is a very hard combinatorial optimisation problem which attracts the interest of many researchers. The university course timetabling problem (UCT
Publikováno v:
Journal of Advanced Research in Fluid Mechanics and Thermal Sciences. 70:13-27
Publikováno v:
MATEMATIKA. 34:333-350
In this paper, we look at the propagation of internal solitary waves overthree different types of slowly varying region, i.e. a slowly increasing slope, a smoothbump and a parabolic mound in a two-layer fluid flow. The appropriate mathematicalmodel f
Publikováno v:
Security and Communication Networks, Vol 2018 (2018)
Phishing attack is a cybercrime that can lead to severe financial losses for Internet users and entrepreneurs. Typically, phishers are fond of using fuzzy techniques during the creation of a website. They confuse the victim by imitating the appearanc
Publikováno v:
Computational Intelligence and Neuroscience
Computational Intelligence and Neuroscience, Vol 2019 (2019)
Computational Intelligence and Neuroscience, Vol 2019 (2019)
Preventive maintenance activities require a tool to be offline for long hour in order to perform the prescribed maintenance activities. Although preventive maintenance is crucial to ensure operational reliability and efficiency of the tool, long hour
Publikováno v:
Decision Support Systems. 88:18-27
This paper proposes a phishing detection technique based on the difference between the target and actual identities of a webpage. The proposed phishing detection approach, called PhishWHO, can be divided into three phases. The first phase extracts id