Search Results - (( developing network usage algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi by Azmi, Aini

    Published 2016
    “…Research benefits in the development of design network especially for bandwidth used on Video used in a network.…”
    Get full text
    Get full text
    Article
  5. 5

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi by Azmi, Aini

    Published 2016
    “…Research benefits in the development of design network especially for bandwidth used on Video used in a network.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Particle swarm optimization for neural network learning enhancement by Abdull Hamed, Haza Nuzly

    Published 2006
    “…Two programs have been developed; Particle Swarm Optimization Feedforward Neural Network (PSONN) and Genetic Algorithm Backpropagation Neural Network (GANN). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of intelligent 3D solid modeler based on artificial intelligent technique by Mohd. Zain, Azlan, Talib, Mohamad Shukor, Harun, Habibollah, Matondang, Muhammad Zaini, Mardzuki, Samihah

    Published 2008
    “…The reconstruction contains two categories namely deriving depth values and deriving hidden point while the representation is the combination of neural network and mathematical model. Four contributions presented in this thesis were a new framework for solid model reconstruction and representation, a new experimental data design in development of the neural network models, neural network models for solid model reconstruction, and hybrid algorithm in representing solid model. …”
    Get full text
    Get full text
    Monograph
  10. 10

    A review on path collisions and resources usage in hybrid optical network on chip (HONoC) by Razali, Rina Azlin, Othman, Mohamed

    Published 2015
    “…These two factors motivate Network-on-Chip (NoC) that brings the techniques developed for macro-scale, multi-hop networks into a chip. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Development of transmission usage allocation scheme for deregulated power systems by Mustafa, Mohd. Wazir, Mohd. Khalid, Saifulnizam

    Published 2008
    “…Finally, a new and an improved transmission usage allocation method have been developed for future of the Malaysian electric energy sector.…”
    Get full text
    Monograph
  14. 14

    WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm by Prajindra S.K., Tiong S.K., Johnny Koh S.P., Yap D.F.W.

    Published 2023
    “…In this work, a new microcontroller board was designed and developed with Genetic Algorithm (GA) embedded on board. …”
    Conference paper
  15. 15

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…This research proposed an optimal downlink scheduling algorithm called Video Real-Time Scheduling Algorithm (VRTSA) to support real-time traffic of video in LTE network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…Three programs have developed; Differential Evolution Neural Network (DENN), Genetic Algorithm Neural Network (GANN) and Particle Swarm Optimization with Neural Network (PSONN) to probe the impact of these methods on ANN learning using various datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. Network resources, especially in a Smart School, are in short supply and relatively expensive to acquire, therefore a control mechanism should be in place so that available resources can be allocated for legitimate usages only. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of AODV based static multi-hop linear routing algorithm using 802.11 wireless sensor network for oil and gas pipeline by Mohamad Yusry Lee, Ikhwan Lee

    Published 2022
    “…To decipher the mentioned problems, this thesis highlighted the challenges faced during the deployment of WSN in a large-scale network. The objective of this research is to develop a reliable AODV based multi-hop linear routing algorithm in accordance with IEEE 802.11 and to analyse the network performance implementing the proposed technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…This thesis presents three decentralized algorithms that are robust,scalable, and can be successfully executed in sensor networks. …”
    Get full text
    Get full text
    Thesis