Search Results - (( java implementation path algorithm ) OR ( based learning protocol algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  6. 6

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
    Get full text
    Get full text
    Thesis
  7. 7

    The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Ahmad A., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
    Conference Paper
  8. 8
  9. 9

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…The proposed ML-IDS achieved outstanding performance, with 24% reduction from the original size of the CICIDS-2018 dataset. Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    text::Thesis
  10. 10
  11. 11

    A new particle swarm optimization for wireless mesh routing protocol by Abd. Rahman, Tharek

    Published 2008
    “…We test the propose algorithm in network simulator 2 (ns2). Based on the results, we proven that PSO-SIIW algorithm can be applied to MPR calculation in OLSR.…”
    Get full text
    Monograph
  12. 12
  13. 13

    Smart Microgrid QoS and Network Reliability Performance Improvement using Reinforcement Learning by Singh, N., Elamvazuthi, I., Nallagownden, P., Badruddin, N., Ousta, F., Jangra, A.

    Published 2021
    “…This paper proposes a reinforcement learning based methodology, Q-reinforcement Learning based Multi-agent based Bellmanford Routing (QRL-MABR), using multiple agents communicating over the microgrid network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A stable energy balancing based clustering routing protocol for IoUT using meta-heuristic technique by Ali, Elmustafa Sayed, Saeed, Rashid A, Eltahir, Ibrahim Khider, Khalifa, Othman Omran

    Published 2024
    “…In such networks, clustering approach enable to reduce the energy consumption in notable rate. In clustering based routing protocols, the cluster head (CH) must be carefully chosen. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Mobility, Residual Energy, and Link Quality Aware Multipath Routing in MANETs with Q-learning Algorithm by Tilwari, Valmik, Dimyati, Kaharudin, Hindia, Mhd Nour, Fattouh, Anas, Amiri, Iraj

    Published 2019
    “…The MRLAM scheme uses a Q-Learning algorithm for the selection of optimal intermediate nodes based on the available status of energy level, mobility, and link quality parameters, and then provides positive and negative reward values accordingly. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications by Uddin I., Awan H.H., Khalid M., Khan S., Akbar S., Sarker M.R., Abdolrasol M.G.M., Alghamdi T.A.H.

    Published 2025
    “…To address this challenge, the paper proposed XGB5hmC, a machine learning algorithm based on a robust gradient boosting algorithm (XGBoost), with different residue based formulation methods to identify 5hmC samples. …”
    Article
  18. 18
  19. 19

    The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria by Zakaria, Ahmad Zulkhair

    Published 2006
    “…Instead of developing the integration module, this project also run an analysis on the effect of VoIP based on UDP protocol and also proposed an algorithm to search an online NBPL’s Skype user.…”
    Get full text
    Get full text
    Student Project
  20. 20

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detection System (IDS) has driven numerous research studies to focus on anomaly-based malware detection without decryption employing various features and Machine Learning (ML) algorithms. …”
    Get full text
    Get full text
    Thesis