Search Results - (( program visualisation using algorithm ) OR ( parameter detection packet algorithm ))

Refine Results
  1. 1

    Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi by Muniyandi, Chandren, Maroosi, Ali

    Published 2015
    “…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis by Zolfaghari, Sahar

    Published 2016
    “…In order to alleviate the time-variant characteristics of the wavelet packet transform coefficients, statistical parameters of wavelet packet coefficients are calculated. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study by Baharudin, Nurul Atiqah, Ahmad Zaiki, Farah Wahida

    Published 2026
    “…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Thus, the new protocol is available to the communicating packets across all computer networks. The new messages and parameters could add to the available option part in the TCP packet header format, which has some free places. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN) by Wan Hassan, Wan Haszerila

    Published 2025
    “…Additionally, an M/M/l queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of different priority queues. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Usually, it is hard to detect DDoS backscatter from the unlabeled packets, where an expert is needed to analyze every packet manually. …”
    Get full text
    Get full text
    Thesis
  12. 12

    IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH by AHMED ALI ALSHAKHSI, SAMEHA

    Published 2013
    “…The results ofall measured quality parameters have…”
    Get full text
    Get full text
    Thesis
  13. 13

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…This application, integrated with a predictive model, offers real-time visualisation of primary cooling system characteristics through handheld devices. …”
    Get full text
    Get full text
    Thesis
  15. 15

    FBGA-based implementation of electronic abacus using altera DE2 board by Sidek, Azmi

    Published 2017
    “…The development of electronic abacus is to integrate the use of abacus along with electronic devices which offers better visualisation of the abacus operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Energy-Aware Clustering Routing for Mobile Ad-Hoc Sensor Networks (MASNETS) by Amanda, Hendrick

    Published 2020
    “…Different experiments have been done using different parameters and numbers of results have been achieved to analyze the performance of algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…The OMNET++ simulation program is used to justify the proposed algorithms. This is done based on the specific parameters such as (number of malicious nodes, number of normal nodes, and maximum speed). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…Cross validation is used to find the best parameters related to kernels used followed by training and testing of the data sets. …”
    Get full text
    Get full text
    Thesis