Search Results - (( based decision drops algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…This derivation initiated the formulation of the modified quadratic driving force, called Time-dependent Quadratic Driving Force (TQDF). Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later refined to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…Some applicants who enrolled for unsuitable programme ended up failed to progress or dropped out from the programme. This study proposed an immunebased technique to recommend suitable undergraduate programmes to support applicants in decision-making. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…Additionally, we find that some algorithms are more sensitive to data leakage than others, as seen by the drop in model accuracy when built without leakage. …”
    Get full text
    Get full text
    Article
  9. 9

    Alumni Data Analytic Management System by Intan Nuur Hazirah, Suaidi

    Published 2019
    “…Besides that, the system will provide data visualization to see the university performance based on their alumni and help in decision-making. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    RESP: Relay suitability-based routing protocol for video streaming in vehicular Ad Hoc Networks by Hammood, Omar A., M. N. M., Kahar, Mohammed, Muamer N.

    Published 2019
    “…In this paper, the RElay Suitability-based Routing Protocol (RESP) which makes a routing decision based on the link stability measurement was proposed for an uninterrupted video streaming. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Delay-based and QoS-aware packet scheduling for RT and NRT multimedia services in LTE downlink systems by Madi, Nadim K. M., Mohd Hanapi, Zurina, Othman, Mohamed, K. Subramaniam, Shamala

    Published 2018
    “…Then, this weight is utilized as a principle for the scheduling decision on the attending flows. Furthermore, the Least Delay Increase (LDI) algorithm is developed to tune the scheduler behavior to maintain a balance between delay and system throughput. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Predictive modelling of student academic performance using machine learning approaches : a case study in universiti islam pahang sultan ahmad shah by Nurul Habibah, Abdul Rahman

    Published 2024
    “…With a huge number of students drop out, the higher education institution’s reputation might be dropped. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.] by Afolabi, Akindele Segun, Akinola, Olubunmi Adewale, Odetoye, Oyinlolu Ayomidotun, Adetiba, Emmanuel

    Published 2025
    “…The resulting data was used to train six different ML-based classifiers. The classifiers considered in this paper were Logistic Regression (LR), Random Forest (RF), Decision Tree (DT), K-Nearest Neighbours (KNN), Support Vector Machines (SVM), and Gradient Boosting Machines (GBM). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…However, the efficiency of the clouds drops as the size of the search space gets larger, like in the case of most metaheuristic optimisation algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…However, due to the drawbacks of the conventional algorithm as well as the heuristic algorithms handling complicated and multi-objective reservoir optimisation, the advantages of the strategy of simultaneous exploration and exploitation led to the decision to utilise meta-heuristic algorithms in this study. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…The merge event bias as one of the essential problems associated with PERT is discussed, along with models and approaches developed by other researchers, namely, Probabilistic Network Evaluation Technique (PNET algorithm), Modified PNET, Back-Forward Uncertainly Estimation procedure (BFUE) and concept based on the robust reliability idea. …”
    Get full text
    Get full text
    Thesis