Search Results - (( java application modified algorithm ) OR ( using decision drops algorithm ))

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Such change may lead to an extreme performance degradation, especially when the routing algorithm relies on fixed threshold values in the dropping decision. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later refined to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…Some applicants who enrolled for unsuitable programme ended up failed to progress or dropped out from the programme. This study proposed an immunebased technique to recommend suitable undergraduate programmes to support applicants in decision-making. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Predictive modelling of student academic performance using machine learning approaches : a case study in universiti islam pahang sultan ahmad shah by Nurul Habibah, Abdul Rahman

    Published 2024
    “…With a huge number of students drop out, the higher education institution’s reputation might be dropped. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network by Tee Y.K., Tiong S.K., Johnny K.S.P., Yeoh E.C.

    Published 2023
    “…The predicted output is used by WCDMA mobile network to make decision on new service request admission. …”
    Conference paper
  12. 12

    Alumni Data Analytic Management System by Intan Nuur Hazirah, Suaidi

    Published 2019
    “…Besides that, the system will provide data visualization to see the university performance based on their alumni and help in decision-making. Furthermore, user can search data using the algorithm or function that created in the system. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…Additionally, we find that some algorithms are more sensitive to data leakage than others, as seen by the drop in model accuracy when built without leakage. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP by Talib Alshammari, Wissam

    Published 2012
    “…One of these speech coding algorithms is linear predictive coding (LPC-10). This thesis implements LPC-10 analysis and synthesis using Matlab and C coding. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…., tasks). Hence, schedule decisions using task scheduling approaches are according to the users’ outlined QoS requirements. …”
    Get full text
    Get full text
    Thesis
  20. 20