Search Results - (( java implementation during algorithm ) OR ( using network usage algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…DRCM was evaluated using network simulation (OptorSim) based on selected performance metrics (mean job execution time, efficient network usage, average storage usage, and computing element usage), scenarios, and topologies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The impact of clustering on the average path length in wireless sensor networks by Aziz, A.A., Şekercioğlu, Y. A.

    Published 2015
    “…Clustering algorithms have been widely used in wireless sensor networks for virtual backbone construction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network by Tee Y.K., Tiong S.K., Johnny K.S.P., Yeoh E.C.

    Published 2023
    “…The proposed algorithm, support vector regression assists genetic algorithm (SVRaGA) was tested in a dynamic WCDMA mobile network simulator. …”
    Conference paper
  8. 8
  9. 9

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A new compression algorithm for small data communication in wireless sensor network by Tuama, Ammar Yaseen, Mohamed, Mohamad Afendee, Muhammed, Abdullah, Mohd Hanapi, Zurina

    Published 2017
    “…Using compression ratio, memory usage, number of instructions and execution speed as a comparison parameters, the proposed algorithm is measured against a set of existing algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks by Alagirisamy, Mukil, Chow, Chee Onn

    Published 2018
    “…In this work, an energy based cluster head selection unequal clustering algorithm (ECH-DUAL) using dual (static and mobile) sink is proposed. …”
    Get full text
    Get full text
    Article
  12. 12

    Particle swarm optimization for neural network learning enhancement by Abdull Hamed, Haza Nuzly

    Published 2006
    “…Backpropagation (BP) algorithm is widely used to solve many real world problems by using the concept of Multilayer Perceptron (MLP). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Power line faults classification by neural network train by Ant Colony Optimization by Nasirudin, Mohd Syafiq

    Published 2017
    “…The characteristic of ACO algorithms is their explicit use of elements of previous solutions. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi by Azmi, Aini

    Published 2016
    “…Research benefits in the development of design network especially for bandwidth used on Video used in a network.…”
    Get full text
    Get full text
    Article
  16. 16

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi by Azmi, Aini

    Published 2016
    “…Research benefits in the development of design network especially for bandwidth used on Video used in a network.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Genetic algorithm optimized network in cloud data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2016
    “…The optimization revolves around the combinations of network card parameters configurations. This could be considered a combinatorial problem, which in our methodology is attempted to be solved using genetic algorithm. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…In the current digital era, network security is an essential concern, especially in the growing usage of wireless networks. …”
    Get full text
    Get full text
    Book Section
  20. 20

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Internet security requirements are increasing due to the growth of internet usage. One of the most efficient approaches used to secure the usage of the internet from internal and external intruders is Intrusion Detection System (IDS). …”
    Get full text
    Get full text
    Get full text
    Article