Search Results - (( deep learning protocol algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Detecting emotions and depression through voice by Gunawan, Teddy Surya

    Published 2021
    “…A deep learning algorithm can detect emotion, including depression, using a voice signal. …”
    Get full text
    Get full text
    Article
  5. 5

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system by Mohamed Ameerdin, Muhammad Irshat, Jamaluddin, Muhammad Herman, Shukor, Ahmad Zaki, Mohamad, Syazwani

    Published 2024
    “…This review introduces an integrated deep learning framework that leverages Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and You Only Look Once (YOLO) algorithms to enhance defect detection in solar panels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Advances in materials informatics: A review by Sivan, Dawn, Kumar, K. Satheesh, Aziman, Abdullah, Raj, Veena, Izan Izwan, Misnon, Ramakrishna, Seeram, Jose, Rajan

    Published 2024
    “…Progress of MI depends on the strength of database and artificial intelligence protocols comprising machine learning (ML) and deep learning (DL) frameworks. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  12. 12

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali by Mohd Ali, Muhammad Afiq

    Published 2025
    “…The study focuses on designing a Hand Gesture Recognition application by means of the YOLOv8 deep learning algorithm to recognize hand gestures associated with autism spectrum disorder (ASD). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
    Get full text
    Get full text
    Article
  18. 18

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  19. 19

    Distributed denial of service attack in HTTP/2: review on security issues and future challenges by Liang Ming, Leau, Yu-Beng, Ying Xie

    Published 2024
    “…Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis