Search Results - (( java implementation learning algorithm ) OR ( using data protocol algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…In Data Grid, data replication is a widely used technique for managing data, where exact copies of data or replicas are created and stored at many distributed sites. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio... by Tan, Ru Yi

    Published 2018
    “…The data collected was subsequently simulated with the software driven algorithm (STAR protocol) and results were analysed to determine if it was better at maintaining blood glucose levels within set targets of 6-10 mmol/L. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…Enhanced Distributed Channel Access (EDCA) protocol is used to support quality of service (QoS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks by Kareem, Husam, Hashim, Shaiful Jahari, Sali, Aduwati, Taha, Omer W., Kazim, Issraa J., Shukri, Shaimaa

    Published 2019
    “…There are many solutions that can be used to overcome the energy limitation issue and one of the main solutions is the routing algorithm used in the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications by Abu-Alhaj, Mosleh Mohammad

    Published 2011
    “…However, the RTP/UDP protocols are used to transfer all types of real-time multimedia applications data such as video conferencing, multimedia streaming, voice data, and so on. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Reliable low power network protocol in IoT for agriculture field by Wong, Christopher Jin Soon

    Published 2024
    “…The data link layer protocol handles the Medium Access Control (MAC) of the mesh network efficiently using algorithms based on the Scheduling sub-cycle of the Fast, Adaptive, and Energy-efficient Multi-channel-multi-path (FAEM) protocol by Liew et al. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20