Search Results - (( java adaptation optimization algorithm ) OR ( software mitigation based algorithm ))
Search alternatives:
- adaptation optimization »
- software mitigation »
- mitigation based »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
3
-
4
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Natural disaster mitigation system with an IoT based TTGO T-Call V1.3 ESP32 wireless module microcontroller / Muhammad Fareez Asyraf Istas Fahrurrazi
Published 2024“…The prototype system involves input and output components, including sensors, LEDs, buzzers, and an LCD display, with software specifications using Arduino IDE. The methodology entails gathering sensor data, evaluating it with a decision-making algorithm, triggering alarms, activating output devices, and transmitting data to the server via HTTP protocols. …”
Get full text
Get full text
Student Project -
6
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
Online harmonic extraction and synchronization algorithm based control for unified power quality conditioner for microgrid systems
Published 2022“…This manuscript proposes an Adaptive Linear Neural Network (ADALINE) based control for the unified power quality conditioner to protect the critical loads from voltage related power quality problems and mitigate the current related power quality problems produced by nonlinear loads. …”
Get full text
Get full text
Article -
10
Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones
Published 2020“…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
Get full text
Get full text
Thesis -
11
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…The test network is generated by fractal based distribution network generation model software tool. …”
Get full text
Get full text
Get full text
Thesis -
12
IoT-based botnet attacks systematic mapping study of literature
Published 2024journal::journal article -
13
-
14
-
15
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region
Published 2016“…In addition, in order to mitigate rockfall hazard, a barrier location was suggested based on less bouncing height and energy. …”
Get full text
Get full text
Thesis -
18
-
19
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
20
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…It allows one single instance of software to serve various clients. Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
text::Thesis
