Search Results - (( java automatic optimization algorithm ) OR ( using internet based algorithm ))
Search alternatives:
- automatic optimization »
- using internet »
- java »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
4
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The objective of this research is to characterize inbound internet traffic collected on real live IP-based campus network, to develop Adaptive Policing and Shaping Algorithms with percentage level on Inbound Traffic based on traffic characterization and to compare the policing and shaping performance on bandwidth used, processing time and packet loss. …”
Get full text
Get full text
Thesis -
5
-
6
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The research scope is based on collected of internet traffic on IP-based network real live traffic at 16 Mbps speed line. …”
Get full text
Get full text
Article -
7
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014“…The SSPC algorithm was used to classifying four types of Internet applications in two stages, initially offline and later online. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Makespan algorithms and heuristic for internet-based collaborative manufacturing process using bottleneck approach
Published 2010“…This paper presents makespan algorithms and scheduling heuristic for an Internet-based collaborative design and manufacturing process using bottleneck approach. …”
Get full text
Get full text
Get full text
Article -
9
Algorithm for the legal regulation of internet financial crime
Published 2024“…The methodology employed in this study is quantitative, focusing on the analysis of Internet financial crime using random forest and association rules based on data processing. …”
Get full text
Get full text
Get full text
Article -
10
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…The Internet Protocol Security (IPSec) is a standard-based method that being used to protect the information that traverse in the Internet networking without expensive cost or complex modification on Internet application itself. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Article -
13
-
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Instead of random Gaussian signal, we trained the codebook using LBG algorithm for Surah Al-Fatihah, and used the trained codebook for the whole Quran. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Thesis -
18
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
20
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Only the authorized receiver can decrypt the ciphertext with the secret key(s) to obtain the plaintext. Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis
