Search Results - (( network implementation method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…The computational tool, Matlab was proposed for classification with Levenberg-Marquardt training algorithm, which provided faster rate of convergence for feed forward network. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…Two selection methods that are used in Genetic Algorithm are the roulette wheel and tournament selections. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  8. 8

    Workability review of genetic algorithm approach in networks by Nurika, O., Zakaria, N., Hassan, F., Jung, L.T.

    Published 2014
    “…In this paper, we surveyed the implementations of genetic algorithm within networks, whether it is computer network, transportation network, and other fields that have networking context. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION by Chiu, Po Chan, Ali, Selamat, Kuok, King Kuok

    Published 2024
    “…These findings revealed the superior performance of the SCANN imputation method compared to the feedforward neural network (FFNN) method, indicating its suitability for efficiently filling missing values in the rainfall database.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…Moreover, to reduce the computational cost while maintaining its accuracy, several techniques were implemented, including All Convolutional Network (ACN), Batch Normalization (BN), and ensemble convolutional neural networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network by Abduh Kaid, Monir Abdullah

    Published 2005
    “…This routing problem is an NPhard problem. Many algorithms are designed by many researchers to perform this routing such as window method, sequential algorithm, degree-descending algorithm, simulated annealing algorithm, genetic algorithm and ant colony algorithm.This thesis explores two approaches, sequential and parallel approaches. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Training functional link neural network with ant lion optimizer by Mohmad Hassim, Yana Mazwin, Ghazali, Rozaida

    Published 2020
    “…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…This paper studies the implementation of the Fast Fourier Transform and Artificial Neural Networks into the recognition of fingerprints. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…This obviously appeared in several metrics of performance evaluation, such as accuracy of localization, node localization rate, and implementation time. Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan by Mohd Ridzuan, Nur Hasyimah

    Published 2015
    “…This paper presents the implementation of site to site VPN tunneling using a network simulator. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These systems find the behavior that is deviated from the normal behavior. Network anomaly detection methods are implemented using different approaches including machine learning, data mining, and many more. …”
    Get full text
    Get full text
    Article
  19. 19

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The ability of detecting P2P host by this algorithm was compared to the detection rate of operational DPI appliances in the network. …”
    Get full text
    Get full text
    Thesis
  20. 20