Search Results - (( java implementation learning algorithm ) OR ( network implementation challenges algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Distributive and self-sustainable scheduling algorithm for wireless sensor networks by Sheikh, M.A., Ali, N.B.Z., Awang, A.

    Published 2013
    “…In the past, many scheduling algorithms were proposed. However, when these techniques were implemented in dense networks, they often lacked the scalability factor due to node failure and dynamic topology changes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Distributive and self-sustainable scheduling algorithm for wireless sensor networks by Sheikh, M.A., Ali, N.B.Z., Awang, A.

    Published 2013
    “…In the past, many scheduling algorithms were proposed. However, when these techniques were implemented in dense networks, they often lacked the scalability factor due to node failure and dynamic topology changes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Distributive and self-sustainable scheduling algorithm for wireless sensor networks by Sheikh, M.A., Ali, N.B.Z., Awang, A.

    Published 2013
    “…In the past, many scheduling algorithms were proposed. However, when these techniques were implemented in dense networks, they often lacked the scalability factor due to node failure and dynamic topology changes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali by Ali, Sinan Ghassan Abid

    Published 2016
    “…For the packet scheduling challenge, the authors propose a resource block preserver (RBP) scheduling algorithm in the downlink of the LTE based femtocell network. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Overload-state downlink resource scheduling and its challenges towards 5G networks by Ferdosian, Nasim, Othman, Mohamed, Kweh, Yeah Lun, Mohd Ali, Borhanuddin

    Published 2016
    “…In this paper, we do a performance study of three overload-state schedulers by implementing such a network environment and exploiting the advantages and drawbacks of the compared algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION by Chiu, Po Chan, Ali, Selamat, Kuok, King Kuok

    Published 2024
    “…This chapter presents the ability of the sine cosine algorithm-based neural network (SCANN) to predict and optimize missing rainfall at different percentages of missing rates. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Clustering in WSNs is a reliable method of effectively transferring data within the network through routing. Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
    Article
  14. 14

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…It is the objective of the research presented in this thesis to propose a solution that can further optimize and improve the performance of message scheduling for routing in the optical Omega network. Based on Zero algorithms, a Modified Zero algorithm is developed to achieve a crosstalk-free version of the algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution by Tijani, Ismaila B., Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2014
    “…However, going by a first principle approach based on physical laws governing the dynamics of the system, this task is noted to be highly challenging due to the complex nonlinear characteristics of the helicopter system.On the other hand, the problem of determining network architecture for optimal/sub-optimal performances has been one of the major challenges in the use of the non parametric approach based on Nonlinear AutoRegressive with eXogenous inputs Network(NARX-network). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…Moreover, to reduce the computational cost while maintaining its accuracy, several techniques were implemented, including All Convolutional Network (ACN), Batch Normalization (BN), and ensemble convolutional neural networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An enhanced feed-forward neural networks and a rule-based algorithm for predictive modelling of students' academic performance by Raheem, Ajiboye Adeleke

    Published 2016
    “…The implementation of the rule-based algorithm proposed in the second approach, shows outputs that are consistently accurate. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fiber-Wireless testbed using software defined radio for protocol and algorithm testing by Ridwan M.A., Mohamed Radzi N.A., Abdullah F.

    Published 2023
    “…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
    Article
  19. 19

    High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring by Al-Mekhlafi, Mohamed Abdulkarem Taher

    Published 2021
    “…A synchronization model is presented with the aid of the implemented Contiki's implicit network time synchronization scheme. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis