Search Results - (( (evolution OR solution) integration concept algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- integration concept »
- concept algorithm »
- implication based »
- java implication »
-
1
Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali
Published 2016“…The RBP algorithm has two layers, upper and lower. The upper layer of the RBP exploits the LTE frame concept that contains a number of sub-frames, whereas the lower layer of the RBP algorithm adopts the concept of a Proportional Fair (PF) algorithm to schedule the non-real time (NRT) flows, while an Exponential/Earliest Deadline (Exp/ED) algorithm is applied for the real time (RT) flows. …”
Get full text
Get full text
Thesis -
2
-
3
Evolution, design, and future trajectories on bipedal wheel-legged robot: A comprehensive review
Published 2023“…It highlights the advantages of hybrid models combining legged and wheeled mobility while stressing the importance of refining control frameworks, trajectory planning, and human-robot interactions. The concept of integrating soft and compliant mechanisms for improved adaptability and resilience is introduced. …”
Get full text
Get full text
Get full text
Article -
4
A modified artificial bee colony algorithm to optimise integrated assembly sequence planning and assembly line balancing
Published 2019“…The proposed algorithm adopts beewolves predatory concept from Grey Wolf Optimiser to improve the exploitation ability in Artificial Bee Colony (ABC) algorithm. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Agro-ento bioinformation: towards the edge of reality
Published 2002“…IPM Concept is a synthetic framework that results from evolution, revolution, and presently bioformation in domains of agro-medico-ecological and anthropo-ecological activities. …”
Get full text
Get full text
Inaugural Lecture -
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
Get full text
Get full text
Thesis -
8
The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis
Published 2025“…The study findings indicate a growing and broader trend towards the integration of metaheuristics and optimization algorithms, echoing the interdisciplinary nature of this domain. …”
Get full text
Get full text
Get full text
Article -
9
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…Five (5) Alternative Algorithm Design Techniques (AADTs) were developed and investigated for suitability in providing process planning solutions suitable for reconfigurable manufacturing. …”
Get full text
Get full text
Thesis -
10
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
Published 2005“…Both load balancing and bandwidth packing concept may contradict each other, but it is possible to incorporate both concepts into a single routing solution. …”
Get full text
Get full text
Thesis -
11
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
12
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry. …”
Get full text
Get full text
Get full text
Article -
13
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
Get full text
Get full text
Thesis -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
Get full text
Get full text
Article -
16
-
17
A new experiential learning electromagnetism-like mechanism for numerical optimization
Published 2023Article -
18
A new experiential learning electromagnetism-like mechanism for numerical optimization
Published 2017“…A new Experiential Learning Electromagnetism-like Mechanism algorithm (ELEM) is proposed in this paper. The ELEM is integrated with two new components. …”
Get full text
Get full text
Article -
19
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
Get full text
Get full text
Get full text
Article -
20
