Search Results - (( developing agent connection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- connection algorithm »
- data normalization »
- developing agent »
- java »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
6
Semantic-Based Scalable Decentralized Resource Discovery
Published 2010“…We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
7
Analysis of a multilevel voltage-based coordinating controller for solar-wind energy generator: a simulation, development and validation approach
Published 2021“…The developed model has different tasks to perform when solar-wind energy sources both produce output voltages simultaneously, also contributing to solving the requirements of different synchronization algorithms for a multi-agent renewable energy system. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Semantic-Based Scalable Decentralized Grid Resource Discovery
Published 2009“…We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
9
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…In addition, another two agents have been developed based on Monte Carlo simulation. …”
Get full text
Get full text
Thesis -
10
-
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
12
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The solution is important by enterprises in making decision to acquire internet connectivity for the purpose of connectivity redundancy and traffic load distribution optimization. …”
Get full text
Get full text
Thesis -
13
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
Get full text
Get full text
Thesis -
14
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
Get full text
Get full text
Thesis
