Search Results - (( new evaluation tree algorithm ) OR ( using simulation based algorithm ))

Refine Results
  1. 1

    Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm by Ibrahim, Hamidah, Yasin, Waheed, Abdul Hamid, Nor Asilah Wati, Udzir, Nur Izura

    Published 2014
    “…In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Detection and classification of conflict flows in SDN using machine learning algorithms by Mutaz Hamed Hussien Khairi, Sharifah Hafizah Syed Ariffin, Nurul Mu'azzah Abdul Latiff, Kamaludin Mohamad Yusof, Mohamed Khalafalla Hassan, Fahad Taha Al-Dhief, Mosab Hamda, Suleman Khan, Muzaffar Hamzah

    Published 2021
    “…Using a range flows from 1000 to 100000 with an increment of 10000 flows per step in two network topologies namely, Fat Tree and Simple Tree Topologies, that were created using the Mininet simulator and connected to the Ryu controller, the performance of the proposed algorithms was evaluated for efficiency and effectiveness across a variety of evaluation metrics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…The proposed EC-TMAC protocol was evaluated through simulation and validated using a statistical analysis tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…The performance of CBH protocol is evaluated theoretically and using simulations. A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Adaptive RS-group scheduling for WiMAX multihop relay by Saeed, Rashid Abdelhaleem, Al-Talib , S.A., Al-Ahdal, T.A., Mohamad, H., Abbas, Majed, Ali, Bashir, Odeh, M.

    Published 2010
    “…The proposed model is evaluated using NS-2 network simulation. The simulation result shows that the proposed scheduling achieves higher throughput performance compared to IEEE 802.16j tree-topology.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects by Mohammed, Waheed Yasin

    Published 2018
    “…In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  11. 11

    An Accurate and Efficient Shooting-and-bouncing-polygon Ray Tracer For Radio Propagation Modelling by Teh, Chin Hui

    Published 2019
    “…We have described the associated problems and proposed an algorithm to perform the transformation or projection.Thirdly, we have proposed a new spatial partitioning scheme to be used with the SBP ray tracer. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    A new multicast-based architecture to support host mobility in IPv6 by M. Ali, Borhanuddin, Habaebi, Mohamed Hadi, AI-Talib, Sahar

    Published 2003
    “…The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for a multicast-based mobile IPv6 network, such that the branches of the tree constitute the shortest paths from the packet source to each of the visited locations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…In addition, the strategy of control mechanism was applied in hybrid algorithm. With the aim of evaluating the algorithm efficiency, comparisons between the proposed strategies and the previous strategies were conducted. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Decision tree-based approach for online management of PEM fuel cells for residential application by Mohd Rusllim, Mohamed

    Published 2004
    “…The accuracy of the decision tree has been tested by evaluating the relative error with respect to the optimized values. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Analysis and comparison of classification algorithms for credit approval in Islamic banks by Pebrianti, Dwi, Wijanarko, Whena, Bayuaji, Luhur, Toha, Siti Fauziah

    Published 2025
    “…The results highlight significant performance differences among the algorithms. Random Forest and Decision Tree demonstrated strong training accuracy but suffered from overfitting, limiting their generalization to new data. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…Therefore, in this study a new optimized variant of machine learning algorithms is presented. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A new multicast-based architecture to support host mobility in IPv6 by Mohd Ali, Borhanuddin, Habaebi, Mohamed Hadi, Al-Talib, Sahar Abdul Aziz

    Published 2003
    “…The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for a multicast-based mobile IPv6 network, such that the branches of the tree constitute the shortest paths from the packet source to each of the visited locations. …”
    Get full text
    Get full text
    Conference or Workshop Item