Search Results - (( data distribution system algorithm ) OR ( model evaluation between algorithm ))

Refine Results
  1. 1

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…This thesis presents a new replication algorithm that improves data access performance in data grids by distributing relevant data copies around the grid. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Materials and Methods: NTCP values from BIOPLAN software is calculated based on standard DVH data. Dose distributions of treatment plans are calculated by using two different algorithms of Oncentra Masterplan (OMP) treatment planning system (TPS) which are Collapse Cone and Pencil Beam. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…The system is simulated using EPANET (Environmental Prediction Agency Network) software based on actual water distribution system (WDS) data from Benghazi city, Libya. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…Modelling refers to constructing a model to depict the structure of the application with its tasks and describing the interactions between them. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…(iii) evaluate and compare the performance based on the execution time, throughput, and CPU utilization of the JQPro model with existing models. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios by Marlindawati, ., Mohammad, Azhar, Esha, Sabir

    Published 2026
    “…The findings demonstrate that robustness is multidimensional and dependent on alignment between model inductive bias and data imperfection type. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…The statistical analysis and pre-processing techniques were applied to the raw data before developing the models. Five statistical indexes are employed to evaluate the performances of various models developed. …”
    Article
  8. 8

    Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain by Mohd Hussain, Mashitah

    Published 2014
    “…First, voltage profile on source distribution system is estimated. The voltage profile is predicted using Independent Component Analysis (lCA) algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Security in robot operating system (ROS) by using Advanced Encryption Standard (AES) by Nor Alia Syuhada, Shaharudin

    Published 2018
    “…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid by Khalid, Khairi

    Published 2017
    “…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network script and neural network error checking measures. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing quality of service in Multi-Radio Multi-Channel Wireless Mesh Networks by Raja Bongsu, Raja Hasyifah

    Published 2023
    “…Striking the right balance between coverage, capacity, and interference management requires scalable load-balancing algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…By using the daily observed data, ANN can map the relationship between rainfall-runoff. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…For more accurate mathematical representation for the empirical outcome power data, a mathematical model based on Bode Equations and Vector Fitting algorithm has been proposed to govern the load power profile of the proposed system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article