Search Results - (( based coding optimisation algorithm ) OR ( java data prediction algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Evolutionary algorithm based network coding for optmization of intelligent vehicular ad hoc network by Lee, Chun Hoe

    Published 2017
    “…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evolutionary algorithm based network coding for optimization of intelligent vehicular ad hoc network by Lee, Chun Hoe

    Published 2017
    “…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoe network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., Sherif M., El-Shafie A.

    Published 2024
    “…In this study, an attempt via metaheuristic algorithms, namely the Harris Hawks Optimisation (HHO) Algorithm and the Opposite Based Learning of HHO (OBL-HHO) are made to minimise the water deficit as well as mitigate floods at downstream of the Klang Gate Dam (KGD). …”
    Article
  6. 6

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…In addition, these characteristics also contribute to the complexity on the data processing and prediction. Big Data analytics is a new concept to process the Big Data. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    MapReduce algorithm for weather dataset by Majid, Mazlina A., Romli, Awanis, Ahmad, Noraziah, Hammad, Khalid Adam Ismail

    Published 2018
    “…In addition, these characteristics also contribute to the complexity on the data processing and prediction. Big Data analytics is a new concept to process the Big Data. …”
    Get full text
    Get full text
    Research Report
  9. 9
  10. 10

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    A genetic algorithm for management of coding resources in VANET by Lee, Chun Hoe, Lim, Kit Guan, Min Keng Tan, Renee Ka Yin Chin, Kenneth Tze Kin Teo

    Published 2017
    “…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Artificial immune network model based controller for vibration suppression of flexible structures by Md. Salleh, Salihatun, Tokhi, M. Osman, Toha, Siti Fauziah

    Published 2010
    “…The AiNet model based controller thus developed shows the capability of the approach with relatively better accuracy in comparison to using real-coded genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This prediction can be made by cluster the new data with the old data and observe where the data belongs. …”
    Get full text
    Get full text
    Thesis
  17. 17

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Thus, there is a need to automate the process of identifying and predicting (positive, negative, or neutral class) these cyber-trooping data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
    Get full text
    Get full text
    Student Project