Search Results - (( mobile evaluation between algorithm ) OR ( inspired classification mining algorithm ))

Refine Results
  1. 1

    Ideal combination feature selection model for classification problem based on bio-inspired approach by Basir, Mohammad Aizat, Hussin, Mohamed Saifullah, Yusof, Yuhanis

    Published 2020
    “…Such a finding indicates that the exploitation of bio-inspired algorithms with ideal combination of wrapper/filtered method can contribute in finding the optimal features to be used in data mining model construction.…”
    Get full text
    Get full text
    Book Section
  2. 2

    Optimization of attribute selection model using bio-inspired algorithms by Basir, Mohammad Aizat, Yusof, Yuhanis, Hussin, Mohamed Saifullah

    Published 2019
    “…Such a finding indicates that bio-inspired algorithms can contribute in identifying the few most important features to be used in data mining model construction.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Rule pruning techniques in the ant-miner classification algorithm and its variants: A review by Al-Behadili, Hayder Naser Khraibet, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2018
    “…Rule-based classification is considered an important task of data classification.The ant-mining rule-based classification algorithm, inspired from the ant colony optimization algorithm, shows a comparable performance and outperforms in some application domains to the existing methods in the literature.One problem that often arises in any rule-based classification is the overfitting problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Article
  6. 6

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff by Sariff, Nohaidda

    Published 2011
    “…The main goal of this research is to compare the performances between Genetic Algorithm (GA) and Ant Colony Optimization (ACO) algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    INVESTIGATION OF IMPROVED CHROMAMETRY MEASUREMENT ALGORITHM FOR PALM OIL FRESHNESS & SAFETY IDENTIFICATION USING MOBILE PHONE by ABDUL RAZAK, FARAH NABILLAH

    Published 2017
    “…The relationship between colour space and the chromametry algorithm measurement is the main criteria when determining the freshness of the food.…”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation by Altag Ali, Gassan, Jeoti , Varun, Manzoor, Shahid

    Published 2010
    “…The Doppler spread, or evenly, the mobile speed of motion, is an evaluation of the spectral spreading of mobile fading channel. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Inter-system handoff management in mobile cellular networks / Syamil Khalid by Khalid, Syamil

    Published 2011
    “…A simulation model developed to study the performance of the relative signal strength with hysteresis and threshold (RSS-HT) algorithm between mobile and radio tower in cellular network. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This method is then utilized as the basis of dynamic ancestral mutual exclusion algorithm for MANET which is named as MDA. This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Inter system handoff management in cellular mobile networks / Syamil Khalid by Khalid, Syamil

    “…This paper presents a handoff technique which supports mobility between dissimilar networks. The boundary cell of cellular network system is designed by using MATLAB design software. …”
    Get full text
    Get full text
    Article
  15. 15

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…This algorithm enables shortened tour length for the respective mobile element. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan by Hasan, Norfadhilah

    Published 2005
    “…The work presented in this paper evaluates the performance of two MANET routing protocol known as Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm (TORA). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. However, since there is an interest in communication between not only mobile devices in an ad hoc network, but also between a mobile device in an ad hoc network and a fixed device in a fixed network (e.g. the Internet), the ad hoc routing protocols need to be modified. …”
    Get full text
    Get full text
    Thesis
  20. 20