Search Results - (( java implementation learning algorithm ) OR ( based sharing protocol algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
    Get full text
    Get full text
    Thesis
  4. 4

    QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks by Qureshi, Barkatullah, Othman, Mohamed, K. Subramaniam, Shamala, Abdul Hamid, Nor Asilah Wati

    Published 2011
    “…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Grouping based radio frequency identification anti-collision protocols for dense internet of things application by Umelo, Nnamdi H., Noordin, Nor K., A. Rasid, Mohd Fadlee, Geok, Tan K., Hashim, Fazirulhisyam

    Published 2022
    “…This paper analyzes selected grouping-based algorithms. Their underlining principles are discussed including their tag estimation methods. …”
    Get full text
    Get full text
    Article
  6. 6

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…Station-to-Station protocol is a protocol based on the Diffie-Hellman key exchange to prevent the man-in-the-middle attack by inserting authentication. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Reduced latency in restricted flooding routing protocol for mobile ad hoc network. by A. Latif, Liza, Ali, A., Fisal, Norsheila

    Published 2007
    “…This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…The proposed authentication protocol has reduced the time required for authentication by 12.5% compared to similar blockchain based authentication protocols. …”
    Get full text
    Get full text
    Thesis
  12. 12

    SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges by Hussein, Nehad Hameed, Koh, Siaw Paw, Yaw, Chong Tak, Tiong, Sieh Kiong, Benedict, F., Yusaf, Talal, K., Kadirgama, Tan, Chung Hong

    Published 2024
    “…The primary objective of this study is to furnish comprehensive information regarding the current SDN-based VANET routing protocols, encompassing intricate details of their underlying mechanisms, forwarding algorithms, and architectural considerations. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…In this thesis, a new approach called enhanced cluster-based TDMA MAC (EC-TMAC) protocol was developed to address these challenges. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…A common Ethernet network functions based on the carrier sense multiple access with collision detection (CSMA/CD) as the media access control (MAC) protocol for data transmission between shared medium. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Relay suitability based routing protocol for video streaming in vehicular ad-hoc network by Omar Abdulmaged, Hammood

    Published 2022
    “…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems by Sinnanaidu, Subba Rao

    Published 2004
    “…The “reputation sharingbased on a distributed polling iv algorithm in which the resource requestors can assess the reliability of respective provider before initiating the download. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A new routing metric for DYMO protocol on mobile AD HOC network by Salleh, Noor Amani

    Published 2013
    “…This research work proposed a SNR-based routing metric for Dynamic Mobile Ad hoc Network onDemand (DYMO) routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…A Medium Access Control (MAC) protocol is responsible to sufficiently provide access to a shared medium. …”
    Get full text
    Get full text
    Thesis
  20. 20

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Hussein N.H., Koh S.P., Yaw C.T., Tiong S.K., Benedict F., Yusaf T., Kadirgama K., Hong T.C.

    Published 2025
    “…The primary objective of this study is to furnish comprehensive information regarding the current SDN-based VANET routing protocols, encompassing intricate details of their underlying mechanisms, forwarding algorithms, and architectural considerations. …”
    Article