Search Results - (( network implementation system algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…The proposed algorithm has been implemented in technical MATLAB package and tested with two examples namely, 18- and 49-bus systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…A neural network based pattern recognition system was implemented and tested on images resembling the parts variations. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Thus the authenticity and privacy of the information transmitted and the data received on networked computers is of utmost importance. The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…Changes in a system model should only induce local changes in a Bayesian network, where as system changes might require the design and training of an entirely new Neural network. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of a new Preference Based Final Year Project title selection system for undergraduate engineering students in UNITEN by Hasan M.H., Mohamed Sahari K.S., Anuar A.

    Published 2023
    “…The new system, dubbed the Preference Based system, uses a computer algorithm to allocate titles to students based on students' submissions of their 10 most preferred titles in order of preference. …”
    Article
  13. 13

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…Distributed Generators is being implemented in the distribution network to improve the performance of the network by reducing the real and reactive power losses, while improving voltage profile during the operation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…Blackout is the worst case scenario that could occur in the power system network. The cascading failure from one part of the system can propagate throughout the network and cause total system blackout. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm: article / Deezex Noor Ainizaa Abdullah by Abdullah, Deezex Noor Ainizaa

    Published 2009
    “…The study involves the development of Artificial Bee Colony (ABC) algorithm to implement loss minimization in a distribution system. …”
    Get full text
    Get full text
    Article
  18. 18

    Offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm / Deezex Noor Ainizaa Abdullah by Abdullah, Deezex Noor Ainizaa

    Published 2009
    “…The study involves the development of Artificial Bee Colony (ABC) algorithm to implement loss minimization in a distribution system. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20