Search Results - (( construct security selection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- selection algorithm »
- security selection »
- java application »
- construct »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The s-box test will be carried out to verify the security of the new determinant s-boxes constructed. …”
Get full text
Get full text
Thesis -
3
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Our system achieved an overall accuracy of 98, outperforming baseline models that used more advanced algorithms such as Random Forest and XGBoost. Our enhanced Gini index feature selection method allowed us to select only 13 out of 45 security features, significantly reducing the data dimensionality and avoiding overfitting issues. …”
Get full text
Get full text
Article -
4
-
5
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
7
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
8
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
9
-
10
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
-
14
A neural network modal decomposition mechanism in predicting network traffic
Published 2023“…The proposed mechanism starts by using SABC to update the model with a new solution and fine-tune the disturbances in each iteration to deal with the interference in order to find the best values that are also synchronously optimal. The SAVE-AS then constructs an adaptive selection operator. It adaptively selects the number of datasets after VMD optimization decomposition to precisely set the number of hidden layer nodes in an ELM to improve prediction accuracy. …”
Get full text
Get full text
Get full text
Thesis -
15
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Finally, we study the provable security element for both cryptosystems. Emphasis is given to the standard security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack, respectively.…”
Get full text
Get full text
Thesis -
16
Development of new code for optical code division multiple access systems
Published 2011“…Firstly, a comprehensive discussion takes place on all important aspects of existing codes from advantages and disadvantages point of view. Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
17
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…This study is primarily aimed at investigating two issues in genetic algorithm (GA) and one issue in conformational search (CS) problems. …”
Get full text
Get full text
Thesis -
18
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The correlation-based feature selection (CFS) method was used to select representative WPD vector subset to eliminate redundancy before combining with other features. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Since it is a costly approach, we propose a detection system using Resource Allocating Network (RAN) with data selection to select essential data. Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis
