Search Results - (( network implementation some algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    A hybrid algorithm for finding shortest path in network routing. by Soltan Aghaei, Mohammad Reza, Ahmad Zulkarnain, Zuriati, Mamat, Ali, Zainuddin, Hishamuddin

    Published 2009
    “…This wave gives an O( N ) steps quantum algorithm for identifying that record, where was used classical Dijkstra’s algorithm for finding shortest path problem in the graph of network and implement quantum search. …”
    Get full text
    Article
  5. 5

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Workability review of genetic algorithm approach in networks by Nurika, O., Zakaria, N., Hassan, F., Jung, L.T.

    Published 2014
    “…In this paper, we surveyed the implementations of genetic algorithm within networks, whether it is computer network, transportation network, and other fields that have networking context. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…Per Hob Behavoiurs (PHBs) are implemented at DiffServ networks nodes using some scheduling and queuing mechanisms that are predecessor by markers and shaper. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-Backpropagation network by Wan Ishak, Wan Hussain, Siraj, Fadzilah, Othman, Abu Talib

    Published 2002
    “…The learning mechanism for Neural Network is its learning algorithm. Backpropagation (or backprop) algorithm is one of the well-known algorithms in neural networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11

    Implementing universal priority DBA algorithm in PIC based EPON testbed by Radzi N.A.M., Din N.M., Al-Mansoori M.H., Majid M.S.A., Abdullah F.

    Published 2023
    “…Ethernet passive optical network (EPON) is becoming one of the best schemes in the broadband access network as it combines the Ethernet and passive optical network technology. …”
    Article
  12. 12
  13. 13

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A semi-synchronous label propagation algorithm with constraints for community detection in complex networks by Chin, J.H., Ratnavelu, K.

    Published 2017
    “…Community structure is an important feature of a complex network, where detection of the community structure can shed some light on the properties of such a complex network. …”
    Get full text
    Get full text
    Article
  15. 15

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…At the algorithmic level, several approaches for solving the pose estimation problem are compared in terms of their neural implementability. …”
    Get full text
    Get full text
    Thesis
  17. 17

    PROPOSED METHODOLOGY FOR OPTIMIZING THE TRAINING PARAMETERS OF A MULTILAYER FEED-FORWARD ARTIFICIAL NEURAL NETWORKS USING A GENETIC ALGORITHM by ABDALLA, OSMAN AHMED

    Published 2011
    “…To overcome these limitations, there have been attempts to use genetic algorithm (GA) to optimize some of these parameters. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementation of an inverse-model-based control strategy using neural networks on a partially simulated exothermic reactor by Hussain, Mohd Azlan, Kershenbaum, L.S.

    Published 2000
    “…This paper describes a novel implementation of a neural network inverse-model based control method on a experimental system-a partially simulated reactor, designed to test the use of such non-linear algorithms. …”
    Get full text
    Get full text
    Article
  19. 19

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…Novel feature selection techniques have been developed due to its importance in network intrusion domain. We have discussed some of it in a technical aspect. …”
    Get full text
    Get full text
    Article
  20. 20

    An enhanced feed-forward neural networks and a rule-based algorithm for predictive modelling of students' academic performance by Raheem, Ajiboye Adeleke

    Published 2016
    “…The implementation of the rule-based algorithm proposed in the second approach, shows outputs that are consistently accurate. …”
    Get full text
    Get full text
    Thesis