Search Results - (( developing detection packet algorithm ) OR ( java visualization based algorithm ))
Search alternatives:
- developing detection »
- visualization based »
- java visualization »
- detection packet »
- packet algorithm »
-
1
A performance analysis of association rule mining algorithms
Published 2016“…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
Get full text
Get full text
Conference or Workshop Item -
2
Smart and energy aware routing for the internet of mobile things
Published 2021“…The network simulation process is run in the CupCarbon software which is known as a smart city & IoT wireless sensor network simulator. The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
Get full text
Get full text
Thesis -
4
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Secondly, the algorithm Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with redundant packet forwarding by introducing a new method to reduce the redundant packet forwarding while in dense or sparse conditions to improve the energy consumption effectively. …”
Get full text
Get full text
Thesis -
5
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
Get full text
Get full text
Thesis -
6
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
Get full text
Get full text
Thesis -
7
Flow-based approach on bro intrusion detection
Published 2017“…Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs) face challenges when coping with high volume of traffic. …”
Get full text
Get full text
Get full text
Article -
8
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…Therefore, this authentication process must be further investigated to develop efficient security techniques. This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
9
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Feature extraction based on mel-scaled wavelet packet transform for the diagnosis of voice disorders
Published 2011Get full text
Working Paper -
11
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
12
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…The algorithm is implemented in a simulated network environment and results obtained is analyze based on packet delivery ratio.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
16
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals
Published 2017“…The normal as well as epileptic EEG record-ings were first decomposed into various frequency bands by means of wavelet packet decomposition, and subsequently, statistical features at all developed nodes in the wavelet packet decomposition tree were derived. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals
Published 2018“…The normal as well as epileptic EEG recordings were frst decomposed into various frequency bands by means of wavelet packet decomposition, and subsequently, statistical features at all developed nodes in the wavelet packet decomposition tree were derived. …”
Get full text
Get full text
Article -
20
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This web based approach will be using Java programming language and Mongo DB (NoSQL database) to improve the retrieval performance by 80%, precision of the search result of the bibliographic data by omitting non-significance papers and visualizing a clearer network diagram using centrality measure for better decision making. …”
Get full text
Get full text
Get full text
Article
