Search Results - (( case generation protocol algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A novel secret key generation based on image link by Sulaiman A.H., Al-Shaikhli I.F.T., Wahiddin M.R., Houri S., Jamil N., Ismail A.F.

    Published 2023
    “…One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. …”
    Article
  3. 3

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…In addition, the well-known alternating-offers protocol is used to govern the interactions. To generate Pareto-optimal offer with one-side incomplete information, at first,an algorithm is presented to generate multi-issue offers with perfect (complete)information. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A novel secret key generation based on image link by Sulaiman, Alyaa Ghanim, Taha Alshaikhli, Imad Fakhri, Wahiddin, Mohamed Ridza, Houri, S, Jamil, Norziana, Ismail, Ahmad Fadzil

    Published 2018
    “…To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Dose verification procedures in radiotherapy by Zakaria, Ahmad, Idris, Nik Rusman Nik

    Published 1999
    “…Our results showed that the algorithms (pencil beam) in the planning computer gave acceptable accuracy for our test cases. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic by Munther, Munther Numan, Hashim, Fazirulhisyam, Abdul Latiff, Nurul Adilah, Alezabi, Kamal Ali, Jiun, Terng Liew

    Published 2021
    “…Ethernet is one of the widespread protocols residing in the second layer of the seven-layers Open Systems Interconnection (OSI) model. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…This study’s results proved EFS features of the number of packets sent and received were superior to related outliers percentage and flow features and could remarkably increase the performance up to ~42% in the case of Support Vector Machine accuracy. Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    An efficient network mobility management for a 6LoWPAN mobile network in hospital environments by Shahamabadi, Mohammadreza Sahebi

    Published 2017
    “…Among the different WSN mobility protocols, NEMO is the most common for 6LoWPAN mobile network in buildings equipped with wireless network infrastructure, such as with the case at modern hospitals and clinics. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Traffic Control in a Synchronous Transfer Mode Networks by Khalil, Ibrahim

    Published 1995
    “…Thus, much research is needed not just to improve existing technologies, but to seek a fundamentally different approach toward network architectures and protocols. In particular, new bandwidth allocation and call admission control algorithms need to be studied to meet these new challenges. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment by Rasheed, Mohammad M.

    Published 2012
    “…The detection technique uses specific failure connection statuses on specific protocols such as UDP, TCP, ICMP, TCP slow scanning and stealth scanning as characteristics of the worms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
    Get full text
    Get full text
    Thesis