Search Results - (( developing internet a algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…This paper present an analysis of inbound internet traffic and development of Adaptive Policing and Shaping Algorithms on inbound internet traffic and fitted to traffic model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Internet scanning worms are widely regarded to be a major security threat faced by the Internet community today. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…This project is to design a smart and energy aware routing algorithm for the Internet of Mobile Things. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm by Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2013
    “…In this paper, we developed a high quality speech compression for Quranic recitation by modifying Code Excited Linear Prediction (CELP) algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Monograph
  10. 10
  11. 11

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…Online shaming is an act which involves persecution by the internet. It is a vigilante activity which is carried out through social media on the internet. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  14. 14

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  15. 15
  16. 16

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur by Abdi Nur, Nur Linda

    Published 2007
    “…Web based learning environment has been widely developed and adopted. Many of us use the internet or the "web" (World Wide Web) as a source of information. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Makespan algorithms and heuristic for internet-based collaborative manufacturing process using bottleneck approach by Bareduan, Sallehahmad, Hasan, Sulaiman

    Published 2010
    “…This paper presents makespan algorithms and scheduling heuristic for an Internet-based collaborative design and manufacturing process using bottleneck approach. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin by Saifuddin, Nur Fattin Nadhrah

    Published 2018
    “…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper