Search Results - (( data processing drops algorithm ) OR ( java application reoptimize algorithm ))

Refine Results
  1. 1

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
    Get full text
    Get full text
    Article
  2. 2

    Simulation of single and dual layered rapid pressure swing adsorption by Lai, Yin Ling

    Published 2013
    “…The process variable profiles at CSS obtained from the algorithm are also found to be in excellent agreement with the MSS simulation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Data dissemination in VANETs using clustering and probabilistic forwarding based on adaptive jumping multi-objective firefly optimization by Hamdi, Mustafa Maad, Audah, Lukman, Rashid, Sami Abduljabbar

    Published 2022
    “…Data dissemination in a VANETs network requires a meticulous process to ensure a high quality of service and eliminate hazardous conditions due to congestion or a broadcast storm. …”
    Get full text
    Get full text
    Article
  6. 6

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…The performance of ECRP algorithms was compared with other cluster based algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…To address this problem, we provide suggestions for mitigating data leakage in the training process and analyzing the sensitivity of different algorithms. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Musical instrument identification using Convolutional Neural Network (CNN) algorithm / Muhammad Nur Azri Irfan Abdul Rahman by Abdul Rahman, Muhammad Nur Azri Irfan

    Published 2025
    “…In the development phase, Convolutional Neural Network model was designed and trained using sophisticated techniques of data augmentation, dropping out and hyperparameter tuning under the supervised learning methodology to increase the performance of the system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…The proposed technique is obtained by combining artificial immune network (aiNET) and clonal selection algorithm (CLONALG). Myers-Briggs Type Indicator is also used as a psychological assessment mechanism in the selection process to enhance the accuracy of the proposed technique. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Development of predictive modeling and deep learning classification of taxi trip tolls by Al-Shoukry, Suhad, M. Jawad, Bushra Jaber, Zalili, Musa, Sabry, Ahmad H.

    Published 2022
    “…Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    DEVELOPMENT OF PREDICTIVE MODELING AND DEEP LEARNING CLASSIFICATION OF TAXI TRIP TOLLS by Al-Shoukry S., Jawad B.J.M., Musa Z., Sabry A.H.

    Published 2023
    “…Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Article
  15. 15

    Analysis and modeling of database storage optimization power consumption usage for green data centers by Wan Noor Hamiza, Wan Ali

    Published 2014
    “…The data centers consumed a lot of energy in order to ensure all the processes in data centers running completely every second which this situation can be lead to increase carbon footprint and give negative impact to the world (global warming). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The data was gathered using real-time packet capturing tools which were then processed and moved with model development using different deep learning algorithms such as, LSTM, MLP, RNN and Autoencoders. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…This issue requires an introduction of a flow-based NIDS that reduces the amount of data to be processed by examining aggregated information of related packets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Mining sequence of event from vector-based spatiotemporal database by B.Y., Widodo

    Published 2007
    “…In this paper, we propose VectoFlowMiner, an extension to FlowMiner, a spatiotemporal data mining algorithm. FlowMiner, are targeted for mining from raster-based spatial data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Land Use Changes in Jeli, Kelantan by Muhammad Firdaus Abdul Karim

    Published 2013
    “…Satellite imagery are pre-processed in geometric correction and further processed in subsetting, masking cloud and supervised classification. …”
    Get full text
    Undergraduate Final Project Report