Search Results - (( using robust drop algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    AntNet: a robust routing algorithm for data networks by Haseeb, Shariq, Sidek, Khairul Azami, Ismail, Ahmad Faris, Weng Kin, Lai, Yit Mei, Aw

    Published 2004
    “…Successful implementation and operation of a network largely depends on the routing algorithm in use. To date, several routing algorithms are in use but the problem with these algorithms is that they are either not adaptive or not robust enough, thus limiting the proper use of bandwidth. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Vehicle pick-up and drop-off schedule optimization in a university setting by Teo, Chun Kit

    Published 2024
    “…Lateness will be removed using a lateness waiting time rollback mechanism. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Musical instrument identification using Convolutional Neural Network (CNN) algorithm / Muhammad Nur Azri Irfan Abdul Rahman by Abdul Rahman, Muhammad Nur Azri Irfan

    Published 2025
    “…The motivation behind the project was to help automate the cumbersome task of validating instruments from images using Convolutional Neural Network (CNNs) algorithm to identify the musical instrument so that this task could be completed with higher accuracy. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Experimental implementation controlled SPWM inverter based harmony search algorithm by Najeeb, Mushtaq, Mansor, Muhamad, Razali, Ramdan, Daniyal, Hamdan, A. F. Yahaya, Jabbar

    Published 2017
    “…Based on the output results, the proposed voltage controller using HS algorithm based PI (HS-PI) showed that the inverter output performance is improved in terms of voltage amplitude, robustness, and convergence rate speed as compared to PSO algorithm based PI (PSO-PI). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Capacitor bank placement in radial distribution system using Firefly algorithm method by Annammal A/P Lukus

    Published 2023
    “…Futhermore, the results obtained from the Lmn index is compared and proved with the QV analysis obtained using PSS/E software. Nevertheless, a Firefly Algorithm (FA) has been proposed to find the optimal size of capacitor. …”
    text::Final Year Project
  8. 8

    Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.] by Afolabi, Akindele Segun, Akinola, Olubunmi Adewale, Odetoye, Oyinlolu Ayomidotun, Adetiba, Emmanuel

    Published 2025
    “…In this paper, we experimentally determined the Machine Learning (ML) models that are most robust for use in indoor occupancy detection. This is important because the activities of human subjects in an ML environment are capable of disrupting the data available to some deployed ML models, which might cause the performance of such models to drop. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Implementation of Biological Sprouting Algorithm for NoC Fault Tolerance by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2013
    “…Bio-inspired sprouting algorithm is based on biological brain technique which makes the algorithm robust and the NoC fault tolerant. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Towards enhanced remaining useful life prediction of lithium-ion batteries with uncertainty using optimized deep learning algorithm by Reza M.S., Hannan M.A., Mansor M., Ker P.J., Rahman S.A., Jang G., Mahlia T.M.I.

    Published 2025
    “…The effectiveness of the proposed LSA + LSTM model is assessed using battery aging data from the NASA dataset. In addition, to validate the prediction performance of the proposed LSA + LSTM model, extensive comparisons are performed with other popular optimization-based deep learning methods including artificial bee colony (ABC) based LSTM (ABC + LSTM), gravitational search algorithm (GSA) based LSTM (GSA + LSTM), and particle swarm optimization (PSO) based LSTM (PSO + LSTM) model using different error matrices. …”
    Article
  14. 14

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network by Derrick Qin Sheng, Wong

    Published 2025
    “…A congested wireless network will not only cause wireless devices to have poor network data rates, but also lead to signal drops between the Access Point and the devices. To improve the reliability of IEEE 802.11 wireless network, the proposed enhanced roaming algorithm helps fulfil the requirements of the ongoing growth of new wireless devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20