Search Results - (( java application server algorithm ) OR ( parameter detection tree algorithm ))

Refine Results
  1. 1

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…This research focuses on the parameter estimation, outlier detection and imputation of missing values in a linear functional relationship model (LFRM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparative study of clustering-based outliers detection methods in circular-circular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Yong Zulina, Zubairi, Abdul Ghapor, Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Comparative study of clustering-based outliers detection methods in circular-circular regression model by Siti Zanariah Satari, Nur Faraidah Muhammad Di, Yong Zulina Zubairi, Abdul Ghapor Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparative study of clustering-based outliers detection methods in circularcircular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Yong Zulina, Zubairi, Abdul Ghapor, Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…This study focuses on the parameter estimation and outlier detection for some types of the circular model. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in circular-circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using minimum spanning tree method. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced android malware detection framework using API application framework layer by Abdul Ghani, Saidah Mastura

    Published 2023
    “…Then, the experiment was carried out to test the effectiveness of the proposed enhanced framework using API and manager classes as parameters. By using Decision Tree, k-Nearest Neighbour and Random Forest algorithms, the results were analysed and the performance of the proposed enhanced framework was validated using Confusion Matrix calculation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article