Search Results - (( case generation protocol algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- protocol algorithm »
- java application »
- case generation »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
A novel secret key generation based on image link
Published 2023“…One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. …”
Article -
3
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…In addition, the well-known alternating-offers protocol is used to govern the interactions. To generate Pareto-optimal offer with one-side incomplete information, at first,an algorithm is presented to generate multi-issue offers with perfect (complete)information. …”
Get full text
Get full text
Thesis -
4
A novel secret key generation based on image link
Published 2018“…To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical secret key. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
6
-
7
Dose verification procedures in radiotherapy
Published 1999“…Our results showed that the algorithms (pencil beam) in the planning computer gave acceptable accuracy for our test cases. …”
Get full text
Get full text
Conference or Workshop Item -
8
Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic
Published 2021“…Ethernet is one of the widespread protocols residing in the second layer of the seven-layers Open Systems Interconnection (OSI) model. …”
Get full text
Get full text
Get full text
Article -
9
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…This study’s results proved EFS features of the number of packets sent and received were superior to related outliers percentage and flow features and could remarkably increase the performance up to ~42% in the case of Support Vector Machine accuracy. Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
Get full text
Get full text
Undergraduates Project Papers -
11
An efficient network mobility management for a 6LoWPAN mobile network in hospital environments
Published 2017“…Among the different WSN mobility protocols, NEMO is the most common for 6LoWPAN mobile network in buildings equipped with wireless network infrastructure, such as with the case at modern hospitals and clinics. …”
Get full text
Get full text
Thesis -
12
Traffic Control in a Synchronous Transfer Mode Networks
Published 1995“…Thus, much research is needed not just to improve existing technologies, but to seek a fundamentally different approach toward network architectures and protocols. In particular, new bandwidth allocation and call admission control algorithms need to be studied to meet these new challenges. …”
Get full text
Get full text
Thesis -
13
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
Published 2012“…The detection technique uses specific failure connection statuses on specific protocols such as UDP, TCP, ICMP, TCP slow scanning and stealth scanning as characteristics of the worms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
Get full text
Get full text
Thesis
