Search Results - (( deployment security selection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- selection algorithm »
- security selection »
- java application »
- deployment »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Distributed Denial of Service detection using hybrid machine learning technique
Published 2014“…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
Get full text
Conference or Workshop Item -
3
SGM: Strategic Game Model for resisting node misbehaviour in IoT-Cloud ecosystem
Published 2022“…At the same time, a unique role is given to a node for restoring resources during communication or security operations. Adopting an analytical research methodology, the proposed model uses public and private cloud systems for integrating quality service delivery with secure agreements using a Global Trust Controller and core node selection controller to select an intermediate node for data propagation. …”
Get full text
Get full text
Get full text
Article -
4
Multi-hop and mesh for LoRa networks: Recent advancements, issues, and recommended applications
Published 2024“…The approaches are systematically classified into four (4) aspects: energy awareness, concurrent access and duty cycle regulations, routing protocols, and security. The first aspect encompasses parameter selection, distance, and clustering. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
SGM : Strategic game model for resisting node misbehaviour in IoT-cloud ecosystem
Published 2022“…At the same time, a unique role is given to a node for restoring resources during communication or security operations. Adopting an analytical research methodology, the proposed model uses public and private cloud systems for integrating quality service delivery with secure agreements using a Global Trust Controller and core node selection controller to select an intermediate node for data propagation. …”
Get full text
Get full text
Get full text
Article -
6
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The study also explores the criteria for node formation and selection, proposing a multi-criterion, energyefficient routing mechanism that takes into account security and sets directions for future research. …”
Get full text
Get full text
Get full text
Thesis -
7
Multi-criteria optimization framework for cloudlet computing in WMANs: integrating VL-WIDE and AHP for enhanced decision-making
Published 2026“…Comprehensive time-series evaluations demonstrate that our framework significantly outperforms conventional systems and other benchmark algorithms, with VL-WIDE and AHP achieving the lowest root mean square error (RMSE) of 16.7, a 5.1% improvement over random selection. …”
Get full text
Get full text
Article -
8
Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming
Published 2024“…Subsequently, the selected superior modified stacked ensemble MLR-SVR-based algorithms are utilized to forecast the 5-year future rice production for each low-middle and upper-middle Southeast Asia nation. …”
Get full text
Get full text
Conference or Workshop Item -
9
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
10
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…The deployment of CV serves to assess the model's performance and ensure its resilience. …”
Get full text
Get full text
Get full text
Article -
11
A Review of Electromagnetic Safety Protection Technologies
Published 2025“…This paper provides a systematic review and comparative analysis of five pivotal electromagnetic-compatibility (EMC) and safety-protection technologies: the “OODA-loop”-based intelligent protection system, shielding techniques, energy-selective electromagnetic protection, cooperative electromagnetic-security suppression, and electromagnetic-noise jamming. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
-
13
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
Get full text
Get full text
Get full text
Article -
14
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
15
Machine Learning in Ambient Assisted Living for Enhanced Elderly Healthcare: A Systematic Literature Review
Published 2025“…The review methodically analyzes articles and papers from the year 2020, selected based on their relevance to AAL technologies, their use of ML algorithms, and their focus on elderly care. …”
Get full text
Get full text
Article
