Search Results - (( developing learning protocol algorithm ) OR ( java implementation during algorithm ))

Refine Results
  1. 1

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  2. 2

    A protocol for developing a classification system of mosquitoes using transfer learning by Pradeep Isawasan, Zetty Ilham Abdullah, Ong, Song Quan, Khairulliza Ahmad Salleh

    Published 2022
    “…This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    text::Thesis
  5. 5

    The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Ahmad A., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
    Conference Paper
  6. 6
  7. 7

    The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria by Zakaria, Ahmad Zulkhair

    Published 2006
    “…Through the new assigned module, NBPL’s users can view all the online NBPL’s Skype user and also can click at the username to contact the user via VoIP call managed by the Skype application. Instead of developing the integration module, this project also run an analysis on the effect of VoIP based on UDP protocol and also proposed an algorithm to search an online NBPL’s Skype user.…”
    Get full text
    Get full text
    Student Project
  8. 8

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali by Mohd Ali, Muhammad Afiq

    Published 2025
    “…Future work should help develop protocols that expand dataset availability and increase the model's accuracy while incorporating some complex AI algorithms to better support these fields in providing clinical and therapeutic applications.…”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm by Muhsen, Yousif Raad, Husin, Nor Azura, Zolkepli, Maslina, Manshor, Noridayu, Al-Hchaimi, Ahmed Abbas Jasim, Ridha, Hussein Mohammed

    Published 2023
    “…The main idea of the proposed method is to develop a prediction model, speci‚cally an Arti‚cial Neural Network (ANN) optimized using the Guaranteed Convergence Arithmetic Optimization Algorithm (GCAOA-ANN), for predicting the utilized routing algorithm in NoC-based MPSoC platform during the DSE process. …”
    Get full text
    Get full text
    Article
  20. 20

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis