Search Results - (( developing failure connection algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1
  2. 2

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This random deployment causes issues such as coverage hole, overlapping and connectivity failure that contributes to the performance of coverage and connectivity of WSN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Wireless water quality cloud monitoring system with self-healing algorithm by Syed Ariffin, Sharifah Hafizah, Baharudin, Muhammad Ariff, Mohd Fauzi, Mohd Husaini, Abdul Latiff, Nurul Mu'azzah, Syed Yusof, Sharifah Kamilah, Abdul Latiff, Nurul Adilah

    Published 2017
    “…The result shows that the self-healing algorithm is able to recover itself without physical reseting, in case during distruption of wireless service connection failure.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…Power systems are susceptible to unavoidable failures or outages. One of these incidents is critical line outage, which can lead to the occurrence of severe cascading failures. …”
    text::Thesis
  7. 7

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…This research aims to develop an improved model for subspace clustering based on density connection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…This research aims to develop an improved model for subspace clustering based on density connection. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Reproducing kernel Hilbert space method for cox proportional hazard model by Abdul Manaf, Nur'azah

    Published 2016
    “…Finally, we propose an algorithm of minimization of the loss function in the general Cox model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Vertical Handover Decision Processes for Fourth Generation Heterogeneous Wireless Networks by Al-Khalid, Hj Othman, Mahmood, Adnan, Hushairi, Zen

    Published 2013
    “…Thus to achieve seamless mobility and the requisite Quality of Service (QoS) in such a diverse environment, efficient ‘Vertical Handover Decision (VHD)’ algorithms needs to be designed in order to avert any degradation of services, reduction in throughput, increase in blocking probability and packet loss caused due to the unnecessary handovers, handover failures and connection breakdowns. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of elasto-plastic viscous damper finite element model for reinforced concrete frames by Hejazi, Farzad, Zabihi, Alireza, Jaafar, Mohd Saleh

    Published 2014
    “…The finite element model consists of reinforced concrete frame element and viscous damper element is developed and special finite element algorithm using Newmark׳s direct step-by-step integration is developed for inelastic dynamic analysis of structure with supplementary elasto-plastic viscous damper element. …”
    Get full text
    Get full text
    Article
  15. 15

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…Second, the increasing demand for controllers exposes the network to control planes and connection failures, which are the most frequent problems in SDN networks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real time vein visualization using near-infrared imaging by May, Y. H., Ernawan, Ferda

    Published 2020
    “…This system is developed based on near-infrared imaging and is connected to the monitor screen. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…Many application scenarios require connectivity between WSN’s nodes to transmit the collected data to a sink node. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…For wider support of wireless connectivity and developing easy-to-use technologies, substantial efforts are underway to reduce human intervention in the configuration, formation, and maintenance processes of these networks. …”
    Get full text
    Get full text
    Get full text
    Article