Search Results - (( model validation protocol algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- protocol algorithm »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio...
Published 2018“…The data collected was subsequently simulated with the software driven algorithm (STAR protocol) and results were analysed to determine if it was better at maintaining blood glucose levels within set targets of 6-10 mmol/L. …”
Get full text
Get full text
Thesis -
3
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…Validation of the algorithm via the “OPNET” modeler suite software simulation results analysis is also to be carried out to define the best gateway for mapping process. …”
Get full text
Get full text
Final Year Project -
4
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…Validation of the algorithm via the “OPNET” modeler suite software simulation results analysis is also to be carried out to define the best gateway for mapping process. …”
Get full text
Get full text
Final Year Project -
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Cohesive token passing algorithm utilizing software agents
Published 2010“…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
Get full text
Get full text
Article -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To validate the proposed ECG-based authentication protocol model, the FAR and FRR analysis is done and then followed by the complexity analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
10
Adaptive medium access control protocol for dynamic medical traffic with quality of service provisioning in wireless body area network
Published 2024“…Additionally, an M/M/1 queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of the priority queues. …”
Get full text
Get full text
Get full text
Article -
11
A new particle swarm optimization for wireless mesh routing protocol
Published 2008“…Among proactive protocols in wireless mesh networks (WMNs), OLSR has been chosen mainly because it is a link state type protocol that guarantees better performances and a better network control than distance-vector protocol. …”
Get full text
Monograph -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN)
Published 2025“…Additionally, an M/M/l queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of different priority queues. …”
Get full text
Get full text
Thesis -
16
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
17
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. Self-adaptive simulation algorithms were formulated to enable the model’s adaptive capability. …”
text::Thesis -
18
Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement
Published 2025“…Future work will emphasise empirical validation and the deployment of the YOLOv7 model for real-time, on-site assessment of fruit maturity in field conditions. …”
Get full text
Get full text
Get full text
Article -
19
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…The protocol's security was proved using the formal verification ROR model and automated security verifier ProVerif tool to validate the protocol resistance against various attacks and provided forward secrecy. …”
Get full text
Get full text
Article -
20
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
Published 2011“…In addition Link throughput and average delay was calculated using queuing network model; as this model is suitable for evaluating the IEEE 802.11 MAC that is used for push to talk applications. …”
Get full text
Get full text
Thesis
