Search Results - (( developing learning protocol algorithm ) OR ( java application ria algorithm ))
Search alternatives:
- protocol algorithm »
- learning protocol »
- java application »
- application ria »
- ria algorithm »
-
1
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
2
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
Get full text
Get full text
Get full text
Article -
3
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
text::Thesis -
4
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024“…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
Conference Paper -
5
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
6
The integration of Voip and e-Learning system in a collaborative learning environment / Ahmad Zulkhair Zakaria
Published 2006“…Through the new assigned module, NBPL’s users can view all the online NBPL’s Skype user and also can click at the username to contact the user via VoIP call managed by the Skype application. Instead of developing the integration module, this project also run an analysis on the effect of VoIP based on UDP protocol and also proposed an algorithm to search an online NBPL’s Skype user.…”
Get full text
Get full text
Student Project -
7
-
8
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
9
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali
Published 2025“…Future work should help develop protocols that expand dataset availability and increase the model's accuracy while incorporating some complex AI algorithms to better support these fields in providing clinical and therapeutic applications.…”
Get full text
Get full text
Thesis -
11
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023Article -
12
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
Get full text
Get full text
Thesis -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
15
Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm
Published 2023“…The main idea of the proposed method is to develop a prediction model, speci‚cally an Arti‚cial Neural Network (ANN) optimized using the Guaranteed Convergence Arithmetic Optimization Algorithm (GCAOA-ANN), for predicting the utilized routing algorithm in NoC-based MPSoC platform during the DSE process. …”
Get full text
Get full text
Article -
16
Detecting emotions and depression through voice
Published 2021“…A deep learning algorithm can detect emotion, including depression, using a voice signal. …”
Get full text
Get full text
Article -
17
Windows-Based bandwidth allocation on optical networks
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Real-time and predictive analytics of air quality with IoT system: A review
Published 2020“…(iv) Data analytics for Air Pollution Index (API) prediction along with IoT, with various communication protocols can as-sist in the development of real-time, and continuous high precision environmen-tal monitoring systems. v) Machine Learning (ML) Regression algorithm is suit-able for prediction and classification of concentration gas pollutant, while ANN and SVM algorithm is used for forecasting.…”
Get full text
Get full text
Get full text
Book Chapter
