Search Results - (( develop processing protocol algorithm ) OR ( java application learning algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
    Get full text
    Get full text
    Article
  5. 5

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…The resulting approach can be further improved via continuous research and development (R&D) to produce a more reliable and resilient protocol. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…The resulting approach can be further improved via continuous research and development (R&D) to produce a more reliable and resilient protocol. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the routing process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…These protocols, algorithms, and visualisations undergo dynamic incubation processes to produce the end product, which is bioinformation. …”
    Get full text
    Get full text
    Inaugural Lecture
  16. 16

    Computational model for energy aware TDMA-based MAC protocol for wireless sensor network system by A. Rashid, Rozeha, Ehsan, Wan Mohd. Arif, Zaharim, Azami, Fisal, Norsheila

    Published 2007
    “…This paper proposes a novel approach that tries to reduce idle energy consumption by implementing active-sleep algorithm named energy aware A-MAC protocol. The result from the computational model shows that the algorithm can prolong the network lifetime due to efficiency in energy consumption from time slot management.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A protocol for developing a classification system of mosquitoes using transfer learning by Pradeep Isawasan, Zetty Ilham Abdullah, Ong, Song Quan, Khairulliza Ahmad Salleh

    Published 2022
    “…Transfer learning is a type of machine learning that is viable and durable in image classification with limited training images. This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…L-TDMA shows a remarkable ability to conserve power in comparison to other protocols in different operating systems. Finally, the implementation of the developed embedded algorithms for strain-based applications resulted in a power consumption reduction of 77% compared to centralized processing.…”
    Get full text
    Get full text
    Thesis