Search Results - (( intelligence _ protocol algorithm ) OR ( intelligence based access algorithm ))
Search alternatives:
- protocol algorithm »
- intelligence based »
- access algorithm »
- based access »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
2
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024Subjects:Article -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
4
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…Then, the potential of SDN-based VANET is explored from the aspect of routing and the design requirements of routing protocols in SDVNs. SDVN routing algorithms are uniquely classified according to various criteria. …”
Article -
5
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…Then, the potential of SDN-based VANET is explored from the aspect of routing and the design requirements of routing protocols in SDVNs. SDVN routing algorithms are uniquely classified according to various criteria. …”
Get full text
Get full text
Get full text
Article -
6
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
7
Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments
Published 2022“…VANETs clustering is essential functionality to serve routing protocols and in enable reliable VANETs. Clustering algorithms for VANETs operate in decentralized mode, which requires incorporating additional stages before deciding the clustering decisions and might create suboptimality due to the local nature of the decentralized approach. …”
Get full text
Get full text
Article -
8
IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al]
Published 2025“…This study presents an Internet of Things (IoT)-based intelligent monitoring and alert system for detecting headwater phenomena in real time. …”
Get full text
Get full text
Get full text
Article -
9
A novel artificial intelligence based timing synchronization scheme for smart grid applications
Published 2020“…Therefore, to reduce this clock offsets, a new algorithm is needed which may consider any alternative reference timestamps rather than GPS. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Cauchy density-based algorithm for VANETs clustering in 3D road environments
Published 2022“…VANETs clustering is essential functionality to serve routing protocols and enable reliable VANETs. Clustering algorithms for VANETs operate in a decentralized mode, which requires incorporating additional stages before deciding the clustering decisions and might create sub-optimality due to the local nature of the decentralized approach. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System
Published 2023Article -
14
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…The QoS+ protocol is evaluated by a developed VANET simulator using NS2 software. …”
Get full text
Get full text
Article -
15
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…The primary goal of this dissertation is to evaluate the security metric for IoT based locking system and design an enhance smart locking system that leverages the capabilities of Artificial Intelligence for facial recognition from the ground up. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
Published 2022“…The QoS+ protocol is evaluated by a developed VANET simulator using NS2 software. …”
Get full text
Get full text
Article -
17
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2022“…The QoS+ protocol is evaluated by a developed VANET simulator using NS2 software. …”
Get full text
Get full text
Get full text
Article -
18
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025Article -
19
-
20
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph
