Search Results - (( developing information service algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Indoor parking location information through Short Message Service (SMS) / Nurul Hidayu Abdul Aziz by Abdul Aziz, Nurul Hidayu

    Published 2010
    “…Indoor Parking Location Information through Short Message Service (SMS) is developing to help the drivers to find back their vehicle using their mobile phone via text messaging technology. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…The aim of this thesis is to develop a fair and effi- cient packet scheduling and adaptive multiuser frequency-time domain resources allocation algorithms to support QoS for a diverse service class in OFDMA based IEEE 802.16 network. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Rapid Penang travel planner mobile application using GPS positioning and decision-making algorithm / Naslyiana Abdul Latif by Abdul Latif, Naslyiana

    Published 2015
    “…Thus, this project will describe about Rapid Penang travel planner that implement in mobile application to make user easy get information regarding Rapid Penang services. The technique used by this project are GPS positioning and decision-making algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…The usage will allowthem to access the system that manipulates this algorithm. The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Courier delivery services visualisor (CDSV) with an integration of genetic algorithm and A* engine by Jalaluddin, Mohammad Fariduddin, Kamaru-Zaman, Ezzatul Akmal, Abdul Rahman, Shuzlina, Mutalib, Sofianita

    Published 2017
    “…Distributors are unable to plan their distribution path with the minimal distance.Furthermore distributors are only able to reach each district distribution centre once a day and revisit the distribution centre will increase the time spent and operation cost. This study developed Courier Delivery Services Visualisor (CDSV) that is able to visualize the best route to be taken by distributor, so that the courier service can arrive on time.CDSV employed Genetic Algorithm (GA) and Astar Algorithm (A*) that integrates with Geographical Information System (GIS) data.A graphical user interface in the form of simulation map that suggests the best route and the optimal distance are displayed for easier courier service distribution references.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Securing m-government transmission based on symmetric and asymmetric algorithms: A review by Watari M.A., Zaidan A.A., Zaidan B.B.

    Published 2023
    “…This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses. � 2013 Asian Network for Scientific Information.…”
    Article
  14. 14

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    text::Thesis
  17. 17

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…Because of some constraint, so this system is not exploring more on the development of algorithm and representation of map. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). LBS allow users to access useful information such as the nearest ATM, temple, and so on. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Use of Internet enabled mobile devices has facilitated the rapid Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). LBS allow users to access useful information such as the nearest ATM, temple, and so on. …”
    Get full text
    Get full text
    Article
  20. 20

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…This application also can encrypt the folder that contains the private information such as business plan etc. The purpose ofthe development is to provide the security service to the all information in our PC and allow users to protect confidential sensitive messages and documents sent over insecure medium of Internet. …”
    Get full text
    Get full text
    Final Year Project