Search Results - (( developing reporting protocol algorithm ) OR ( java segmentation mining algorithm ))
Search alternatives:
- developing reporting »
- segmentation mining »
- reporting protocol »
- protocol algorithm »
- java segmentation »
- mining algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017Get full text
Get full text
Monograph -
3
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
5
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The algorithm was developed in Visual Basic 6.0v programming language. …”
Get full text
Get full text
Thesis -
6
GPS-less Localization Protocol for Underwater Acoustic Networks
Published 2008“…Second, involving more remote nodes becoming seed nodes for further discoveries. Four different algorithms have been investigated; (i) Farthest/Farthest Algorithm, (ii) Farthest/Nearest Algorithm, (iii) Nearest/Farthest Algorithm and (iv) Nearest/Nearest Algorithm. …”
Get full text
Get full text
Get full text
Article -
7
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
8
Network tool for preventing DDOS attacks on cloud computing
Published 2015Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…This algorithm development has been guided by methodology in four stages. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Smart and energy aware routing for the internet of mobile things
Published 2021“…In this project, we aim to design and develop a new routing algorithm entitled “SEA routing protocol” that is believed to resolve the problems mentioned which will lead to high energy consumption in IoMT devices. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
13
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…Despite notable advancements, significant opportunities remain for enhancing scalability, developing hybrid solutions, applying these methodologies in real-world contexts, and implementing robust security protocols. …”
Get full text
Get full text
Get full text
Article -
14
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…Therefore, it is important to develop an algorithm that would be able to overcome the negative effect of the multi-rate issue on VoIP quality. …”
Get full text
Get full text
Thesis -
15
-
16
Trace analyzer for NS-2
Published 2023“…This will benefit the user since he or she can concentrate on developing new algorithms or new architectures rather spending too much time on post processing of data. � 2006 IEEE.…”
Conference paper -
17
Comparative evaluation of anomaly-based controller area network IDS
Published 2023“…The vulnerability of in-vehicle networks, particularly those based on the Controller Area Network (CAN) protocol, has prompted the development of numerous techniques for intrusion detection on the CAN bus. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination
Published 2021“…Different levels of IR algorithms were applied in routine CTPA and several modified tube potentials. …”
Get full text
Get full text
Thesis -
20
