Search Results - (( (evolution OR solution) integration concept algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali by Ali, Sinan Ghassan Abid

    Published 2016
    “…The RBP algorithm has two layers, upper and lower. The upper layer of the RBP exploits the LTE frame concept that contains a number of sub-frames, whereas the lower layer of the RBP algorithm adopts the concept of a Proportional Fair (PF) algorithm to schedule the non-real time (NRT) flows, while an Exponential/Earliest Deadline (Exp/ED) algorithm is applied for the real time (RT) flows. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Evolution, design, and future trajectories on bipedal wheel-legged robot: A comprehensive review by Zulkifli, Mansor, Irawan, Addie, Mohammad Fadhil, Abas

    Published 2023
    “…It highlights the advantages of hybrid models combining legged and wheeled mobility while stressing the importance of refining control frameworks, trajectory planning, and human-robot interactions. The concept of integrating soft and compliant mechanisms for improved adaptability and resilience is introduced. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A modified artificial bee colony algorithm to optimise integrated assembly sequence planning and assembly line balancing by M. F. F., Ab Rashid, N. M. Z., Nik Mohamed, A. N. M., Rose

    Published 2019
    “…The proposed algorithm adopts beewolves predatory concept from Grey Wolf Optimiser to improve the exploitation ability in Artificial Bee Colony (ABC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…IPM Concept is a synthetic framework that results from evolution, revolution, and presently bioformation in domains of agro-medico-ecological and anthropo-ecological activities. …”
    Get full text
    Get full text
    Inaugural Lecture
  7. 7

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…The study findings indicate a growing and broader trend towards the integration of metaheuristics and optimization algorithms, echoing the interdisciplinary nature of this domain. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…Five (5) Alternative Algorithm Design Techniques (AADTs) were developed and investigated for suitability in providing process planning solutions suitable for reconfigurable manufacturing. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin by Tan, Jiann Shin

    Published 2005
    “…Both load balancing and bandwidth packing concept may contradict each other, but it is possible to incorporate both concepts into a single routing solution. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S. M. M Yassin, S. M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S.M.M Yassin, S.M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  15. 15

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    A new experiential learning electromagnetism-like mechanism for numerical optimization by Tan, J.D., Dahari, M., Koh, S.P., Koay, Y.Y., Abed, I.A.

    Published 2017
    “…A new Experiential Learning Electromagnetism-like Mechanism algorithm (ELEM) is proposed in this paper. The ELEM is integrated with two new components. …”
    Get full text
    Get full text
    Article
  19. 19

    Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers by Asmawi, Aziah, Md Yasin, Sharifah, Mohd Shah, Nur Hazierah

    Published 2024
    “…Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20