Search Results - (( using modification protocol algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem, Hayder Natiq, Ahmad Zukarnain, Zuriati, Mohamed, Othman, Subramaniam, Shamala

    Published 2010
    “…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
    Get full text
    Get full text
    Article
  11. 11

    A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications by Uddin I., Awan H.H., Khalid M., Khan S., Akbar S., Sarker M.R., Abdolrasol M.G.M., Alghamdi T.A.H.

    Published 2025
    “…Among the applied machine learning algorithms, the XGBoost ensemble model using the tenfold cross-validation test achieved improved results than existing state-of-the-art models. …”
    Article
  12. 12

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
    Get full text
    Get full text
    Article
  13. 13

    Performance Comparison of Packet Queuing Algorithm in Wireless Networks by Nor Aida, Mahiddin, Raja Hasyifah, Raja Bongsu, Wan Nor Shuhadah, Wan Nik

    Published 2014
    “…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management by Vivaldi, Indra, Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin, V., Prakash

    Published 2003
    “…Our design objective is to re-establish the communication traffic flow quickly and to minimize the service disruption delay that occnrs during handover process in a macro mobility environment. This handover algorithm is based on the modification of the HMIPv6 protocol using the multicast technique concept. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    A new routing metric for DYMO protocol on mobile AD HOC network by Salleh, Noor Amani

    Published 2013
    “…To overcome this problem, several important modifications to the routing protocol algorithms are then considered to operate better in networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2010
    “…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem , Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2009
    “…Approach: In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the AIMD algorithm after developing it to find a new approach, as we called it the New-AIMD algorithm to measure the bottleneck link utilization and use the NCTUns simulator to get the results after make the modification of the mechanism. …”
    Get full text
    Get full text
    Article