Search Results - (( based detection service algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    Article
  3. 3

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  14. 14

    Signal detection algorithm for cognitive radio using singular value decomposition by Omar, Mohd Hasbullah, Hassan, Suhaidi, Amphawan, Angela, Awang Nor, Shahrudin

    Published 2011
    “…This paper highlights an algorithm for detecting the presence of wireless signal using the Singular Value Decomposition (SVD) technique.We simulated the algorithm to detect common digital signals in wireless communication to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in detecting a signal without knowing the properties of the transmitted signal.The performance of the algorithm is better compared to the favorable energy detection.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown.This is also the advantage of the algorithm since any signal would interfere and subsequently affect the quality of service (QoS) of the IEEE 802.22 connection.Furthermore, the algorithm performed better in the low signalto-noise ratio (SNR) environment.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20