Search Results - (( java pattern classification algorithm ) OR ( using integration connection algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Integration of zero and sequential algorithm in shuffle exchange with Minus One Stage by Md Yunus, Nur Arzilawati, Othman, Mohamed, Mohd Hanapi, Zurina

    Published 2013
    “…This paper also shows the details of the illustrative examples used to explain each algorithm. At the end of this chapter, the comparative analysis shows the performance of each algorithm with the integration of shuffle exchange connection pattern in terms of the execution time and number of passes.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    PID Parameters Improvement for AGC in Three Parallel-Connected Power Systems by Mushtaq, Najeeb, Ramdan, Razali, K. G., Mohammed, Hamdan, Daniyal, Ali, M. Humada

    Published 2016
    “…In this research, the automatic generation control (AGC) of three parallel-connected power plants is utilized to tune the proportional-integral-derivative (PID) controller using Multistart algorithm (MS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Reliability performance evaluation and integration of routing algorithm in shuffle exchange with minus one stage by Md Yunus, Nur Arzilawati

    Published 2012
    “…These six algorithms are integrated with four different types of SENs, and all the algorithms are analyze in this research. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Numerical experiment on conformal mapping of doubly connected regions onto a disk with a slit by Murid, Ali H. M., Laey, Nee Hu

    Published 2009
    “…Together with some normalizing conditions, a unique solution to the system is then computed by means of an optimization method called the Lavenberg-Marquadt algorithm. Once we have determined the boundary values of , we use the Cauchy integral formula to compute the interior of the regions. …”
    Get full text
    Article
  7. 7

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An energy efficient simultaneous-node repositioning algorithm for mobile sensor networks by Khan, M.A., Hasbullah, H., Nazir, B., Khan, I.A.

    Published 2014
    “…Recently, several methods that use the relocation of nodes for connectivity restoration have been proposed. …”
    Get full text
    Get full text
    Article
  9. 9

    Development of multi-objective optimization methods for integrated scheduling of handling equipment (AGVs, QCs, SP-AS/RS) in automated container terminals by Homayouni, Seyed Mahdi

    Published 2012
    “…Therefore, two meta-heuristic algorithms, namely genetic algorithm (GA) and simulated annealing (SA) algorithm, were developed to optimize the integrated scheduling of handling equipment. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Proportional-integral control optimization using imperialist competitive algorithm by Soheilirad, Mohammadsoroush

    Published 2012
    “…In this dissertation, an attempt has been made to design and implement the PID Controllers by employing the Imperialist Competitive Algorithm (ICA) technique as well as the Genetic Algorithm (GA) and the Particle Swarm Optimization (PSO) algorithm, for a selected plant. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Performance comparison analysis of aes-256 sha-256-hmac, aes-256 md5-hmac, 3des sha-256-hmac and 3des-md5-hmac on ipsec vpn using gns3 / Mohd Hilman Lukman by Lukman, Mohd Hilman

    Published 2016
    “…However performance of encryption needs to be tested as so many encryption algorithms in the market. This paper presented performance comparison analysis between two encryption algorithms and two integrity algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Furthermore, the identification data need to be monitored and transmitted to the business organizations, which are connected through the network. This has been achieved by the integration of RFID-XBee network with database connectivity through Internet of Things (IoT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…Both mechanism was used to maintain data integrity between the prices corresponding to the product. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Handover Decision-Making Algorithm for 5G Heterogeneous Networks by Mark Irwin Goh, Abbas Ibrahim Mbulwa, Hoe, Tung Yew, Aroland Kiring, Chung, Seng Kheau, Ali Farzamnia, Ali Chekima, Manas Kumar Haldar

    Published 2023
    “…The proposed algorithm reduces the number of unnecessary handovers by estimating the connection time to a small cell network using the dwell time prediction technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks by Al-Sanabani, Maher Ali

    Published 2008
    “…The second MPS obtains the user mobility information using the road map information of the cell and the integrated RSS and Global Position System (GPS) measurements. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Grey wolf optimization for enhanced performance in wind power system with dual-star induction generators by Benamara K., Amimeur H., Hamoudi Y., Abdolrasol M.G.M., Cali U., Ustun T.S.

    Published 2025
    “…This study investigates strategies for enhancing the performance of dual-star induction generators in wind power systems by optimizing the full control algorithm. The control mechanisms involved include the PID (Proportional-Integral-Derivative) controller for speed regulation and the PI (Proportional-Integral) controller for flux, DC-link voltage, and grid connection control. …”
    Article
  17. 17
  18. 18
  19. 19

    Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation by Anwar, Farhat, Boby, Rounaqul Islam, Rashid, Muhammad Mahbubur, Alam, Md. Monjurul, Shaikh, Z.

    Published 2017
    “…The framework shares information and communicates with each fire alarm panels connected in peer to peer configuration and declare the network state using network address declaration from any building connected in network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper