Search Results - (( network implementation method algorithm ) OR ( java data visualization algorithm ))

Refine Results
  1. 1

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…Two selection methods that are used in Genetic Algorithm are the roulette wheel and tournament selections. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  5. 5

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Workability review of genetic algorithm approach in networks by Nurika, O., Zakaria, N., Hassan, F., Jung, L.T.

    Published 2014
    “…In this paper, we surveyed the implementations of genetic algorithm within networks, whether it is computer network, transportation network, and other fields that have networking context. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION by Chiu, Po Chan, Ali, Selamat, Kuok, King Kuok

    Published 2024
    “…These findings revealed the superior performance of the SCANN imputation method compared to the feedforward neural network (FFNN) method, indicating its suitability for efficiently filling missing values in the rainfall database.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…Moreover, to reduce the computational cost while maintaining its accuracy, several techniques were implemented, including All Convolutional Network (ACN), Batch Normalization (BN), and ensemble convolutional neural networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network by Abduh Kaid, Monir Abdullah

    Published 2005
    “…This routing problem is an NPhard problem. Many algorithms are designed by many researchers to perform this routing such as window method, sequential algorithm, degree-descending algorithm, simulated annealing algorithm, genetic algorithm and ant colony algorithm.This thesis explores two approaches, sequential and parallel approaches. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Training functional link neural network with ant lion optimizer by Mohmad Hassim, Yana Mazwin, Ghazali, Rozaida

    Published 2020
    “…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…This paper studies the implementation of the Fast Fourier Transform and Artificial Neural Networks into the recognition of fingerprints. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…This obviously appeared in several metrics of performance evaluation, such as accuracy of localization, node localization rate, and implementation time. Conclusion: The proposed algorithm that utilized NMM is more functional to enhance the precision of localization because of particular characteristics that are the flexible implementation of NMM and the free cost of using the RSSI technique.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan by Mohd Ridzuan, Nur Hasyimah

    Published 2015
    “…This paper presents the implementation of site to site VPN tunneling using a network simulator. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These systems find the behavior that is deviated from the normal behavior. Network anomaly detection methods are implemented using different approaches including machine learning, data mining, and many more. …”
    Get full text
    Get full text
    Article
  20. 20

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The ability of detecting P2P host by this algorithm was compared to the detection rate of operational DPI appliances in the network. …”
    Get full text
    Get full text
    Thesis