Search Results - (( java application customization algorithm ) OR ( using negative protocol algorithm ))
Search alternatives:
- customization algorithm »
- protocol algorithm »
- java application »
- using negative »
-
1
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Meanwhile, DFR algorithm was used to identify the false negative read that present in the set of data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A novel spiral backoff mechanism for wireless sensor networks MAC protocol in smart grid system
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
3
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…Therefore, it is important to develop an algorithm that would be able to overcome the negative effect of the multi-rate issue on VoIP quality. …”
Get full text
Get full text
Thesis -
5
Detection algorithm for internet worms scanning that used user datagram protocol
Published 2024journal::journal article -
6
Mobility, Residual Energy, and Link Quality Aware Multipath Routing in MANETs with Q-learning Algorithm
Published 2019“…The proposed scheme makes routing decisions by determining the optimal route with energy efficient nodes to maintain the stability, reliability, and lifetime of the network over a sustained period of time. The MRLAM scheme uses a Q-Learning algorithm for the selection of optimal intermediate nodes based on the available status of energy level, mobility, and link quality parameters, and then provides positive and negative reward values accordingly. …”
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…The results show that the proposed algorithm has better performance and lead to increase stability of transmission link.…”
Get full text
Get full text
Get full text
Article -
9
Traffic management algorithms for LEO satellite networks
Published 2016“…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
Get full text
Get full text
Get full text
Thesis -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
Get full text
Get full text
Thesis -
12
Comparative evaluation of anomaly-based controller area network IDS
Published 2023“…It also consists of masquerade attacks, which have not been commonly used in comparative evaluation studies. Furthermore, in addition to metrics such as accuracy, precision, recall, and F1-score, we report balanced accuracy, informedness, markedness, and Matthews correlation coefficient, which place equal important on positive and negative classes and are better measures of detection capability, especially for imbalanced datasets. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Comparative Analysis of Gene Expressed in Trunking and Non-Trunking Metroxylon sagu Leaves Utilizing Transcriptome Sequencing
Published 2023“…The sequence was de novo-assembled using TRINITY software package and the differentially expressed genes (DEGs) were identified using DESeq2 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
