Search Results - (( java application optimisation algorithm ) OR ( making based drops algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems by Bashar AbedAl Mohdi Talal AlDeeb

    Published 2024
    “…(ii) The global search and fast convergence ability of the intelligent water drops algorithm make it efficient to the problem (Noferesti and Shah-Hosseini, 2012). …”
    thesis::doctoral thesis
  4. 4

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…Some applicants who enrolled for unsuitable programme ended up failed to progress or dropped out from the programme. This study proposed an immunebased technique to recommend suitable undergraduate programmes to support applicants in decision-making. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Data dissemination in VANETs using clustering and probabilistic forwarding based on adaptive jumping multi-objective firefly optimization by Hamdi, Mustafa Maad, Audah, Lukman, Rashid, Sami Abduljabbar

    Published 2022
    “…The metrics to be incorporated in the multi-objective optimizations are the packet delivery ratio (PDR), the end-to-end delay (E2E-delay) and the number of dropped packets. Comparing both AJ-MOFA and CFM with benchmarks using multi-objective optimization and networking metrics reveals the superiority in most evaluation measures, which makes them promising algorithms for data dissemination in VANETs. …”
    Get full text
    Get full text
    Article
  7. 7

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…The performance of ECRP algorithms was compared with other cluster based algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes by Khan, Nusratullah, Akram, M. Usman, Shah, Asadullah, Ahmed Khan, Shoab

    Published 2018
    “…This paper presents a genetic algorithm (GA) based technique for assigning weights to different attributes of a service based on survey data to find overall customer experience management index (CEMI). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Optimized topology control in mobile IP networks using a new parametric routing algorithm by Gholizadeh, Somayyeh, Abdullah, Azizol, Othman, Mohamed, Mohd Hanapi, Zurina

    Published 2018
    “…Then, a new optimal routing algorithm is proposed to make up the node failure and changing Foreign Agent (FA). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Implementation of Biological Sprouting Algorithm for NoC Fault Tolerance by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2013
    “…Bio-inspired sprouting algorithm is based on biological brain technique which makes the algorithm robust and the NoC fault tolerant. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…The results of the study were conducted, based on the accuracy of SVM, which was 82.33% and C4.5 89.29 %%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The base-work paper of the research presents an improvement of DRAND algorithm based on energy consumption in IoT WSN to enhance the node energy consumption and iv increase the network lifetime. …”
    Get full text
    Get full text
    Thesis
  14. 14

    RESP: Relay suitability-based routing protocol for video streaming in vehicular Ad Hoc Networks by Hammood, Omar A., M. N. M., Kahar, Mohammed, Muamer N.

    Published 2019
    “…In this paper, the RElay Suitability-based Routing Protocol (RESP) which makes a routing decision based on the link stability measurement was proposed for an uninterrupted video streaming. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Alumni Data Analytic Management System by Intan Nuur Hazirah, Suaidi

    Published 2019
    “…Besides that, the system will provide data visualization to see the university performance based on their alumni and help in decision-making. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem by Mandangan, Arif, Nazaruddin, Nazreen Syazwina, Asbullah, Muhammad Asyraf, Kamarulhaili, Hailiza, Che Hussin, Che Haziqah, Olayiwola, Babarinsa

    Published 2024
    “…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Electronic Tongue: Study on the Freshness of Milk by Jaafar, Mohamad Nazrin

    Published 2012
    “…As discussed with our supervisor, we have come to a conclusion that, the changes and drop in pH value cannot determine if milk is already spoilt since the one that remains fresh also have noticeable drop in its pH value. …”
    Get full text
    Get full text
    Final Year Project