Search Results - (( intelligence a protocols algorithm ) OR ( intelligence based non algorithm ))
Search alternatives:
- protocols algorithm »
- intelligence based »
- intelligence a »
- non algorithm »
- a protocols »
-
1
-
2
-
3
-
4
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. …”
Get full text
Get full text
Thesis -
5
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
6
Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments
Published 2022“…In addition, a clustering algorithm that defines mobility vector and uses Cauchy-based density for enabling adding vehicles to their respective clusters. …”
Get full text
Get full text
Article -
7
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
Get full text
Get full text
Thesis -
8
-
9
-
10
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy
Published 2020“…In the extended ECH-DUAL algorithm in addition to dual sink a new cluster head selection method is proposed for unequal clustering. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
Energy efficient cluster head distribution in wireless sensor networks
Published 2013“…The probability model will possibly lead to a reduction in network lifetime due to the election of CH with a least desired location in the network. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
-
17
Cohesive token passing algorithm utilizing software agents
Published 2010“…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
Get full text
Get full text
Article -
18
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…This system employs the Raspberry Pi controller to grant access to a private premises without relying on a physical keys like access cards. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…This framework uses an evolving data clustering algorithm by adopting the concept of grid granularity to capture the features of a cluster more efficiently. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph
