Search Results - (( based classification protocol algorithm ) OR ( using function method algorithm ))
Search alternatives:
- classification protocol »
- based classification »
- protocol algorithm »
- method algorithm »
- function method »
- using function »
-
1
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Thus, proposing the method of reestimating the dropping functions in the RED algorithm. …”
Get full text
Get full text
Thesis -
2
Automated feature extraction on brain MRI images for predicting multiple sclerosis patient disability
Published 2022“…From the large-scale features, a correlation analysis is performed to select the highly correlated features used for predicting patients’ disability. This was based on machine learning and regression algorithms at the first phase. …”
Get full text
Get full text
Get full text
Thesis -
3
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
4
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
5
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
6
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
Get full text
Get full text
Thesis -
7
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…In order to address the issue in this research presents a novel protocol based on equal power consumption at all network nodes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks
Published 2014“…This paper presents a new fuzzy logic based link status classification mechanism for use with multipath routing protocols in multi-hop wireless networks like WMNs. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
A Patent Technique of Jaccard Discrete (J-DIS) Similarity Clustering Algorithm
Published 2014“…Mostly, k-Means algorithm finds out similarity between the object based on distance vector for smallest dataset. …”
Get full text
Get full text
Journal -
11
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
Get full text
Get full text
Conference or Workshop Item -
12
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
13
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Brain Machine Interface Controlled Robot Chair
Published 2010“…A particle swarm optimization based algorithm is proposed to train the neural networks. …”
Get full text
Thesis -
16
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis -
17
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
18
Classification of acute leukemia using image processing and machine learning techniques / Hayan Tareq Abdul Wahhab
Published 2015“…Acute leukemia can be further classified to acute lymphoblastic leukemia (ALL) and acute myeloid leukemia (AML) based on the cell lineage. The treatment protocol is allocated based on the leukemia type. …”
Get full text
Get full text
Thesis -
19
Human emotion classifications for automotive driver using skin conductance response signal
Published 2016“…The affective assessment classification rate obtained from SCR processing was more than 70% accuracy based on the off-line support vector machine classifier-processing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
20
