Search Results - (( java implementation learning algorithm ) OR ( using robust protocol algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- protocol algorithm »
- robust protocol »
- using robust »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
3
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…The optimum network model has resulted in five cluster heads network clustering. This model was used to examine and test the FSM- GEAR Protocol and the previous M-GEAR. …”
Get full text
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
12
Reliable Path Selection Packet Forwarding Routing Protocol for Vehicular Adhoc Networks
Published 2019“…One of the crucial issues comprise of the design of scalable routing algorithms that are robust to rapid topology changes and frequent link disconnections caused by high mobility of vehicles. …”
Get full text
Get full text
Get full text
Thesis -
13
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017Get full text
Get full text
Conference or Workshop Item -
14
Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios
Published 2026“…Performance was evaluated using predictive metrics, robustness degradation rate (RDR), and computational efficiency, with statistical validation across repeated experimental runs. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
text::Thesis -
16
Rogue access point detection and tracking system using trilateration algorithm
Published 2023Get full text
Get full text
Book Section -
17
-
18
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
20
Node status detection and information diffusion in router network using scale-free network
Published 2014“…In this paper we have used the concept of scale-free network theory to design a more robust data dissemination approach which can be used in one dynamical Autonomous Systems (AS) to know the appearance and disappearance of nodes, and speedily propagate the information to all nodes in the routers network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
