Search Results - (( java application learning algorithm ) OR ( rate detection protocol algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- protocol algorithm »
- java application »
- rate detection »
-
1
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
Get full text
Get full text
Get full text
Thesis -
2
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
3
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Results obtained showed that the classifier had detection accuracy, Area Under Receiver Operating Curve (AUC), true positive rate, false positive rate and a false negative rate of 99.89%, 99.89%, 99.95%, 0.18%, and 0.05% respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Evaluation metrics such as malicious activity detection rate, energy consumption, end-to-end delay, and resilience time are measured. …”
Get full text
Get full text
Article -
6
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
Get full text
Get full text
Get full text
Thesis -
7
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…The user then strives to maximize the sending rate without causing network congestion. To achieve this, the users implement a flow control algorithm that controls the rate at which data packets are sent into the Internet. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
10
-
11
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…The agent also monitors the quality of conversations from the periodically generated Real Time Control Protocol (RTCP) reports. If voice quality degradation is detected, then the agent performs further rate adaptation to improve the quality. …”
Get full text
Get full text
Thesis -
13
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
14
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…Referring to quantum theory, every key that we transform into bits cannot be cloned. This QKD protocol is believed to be able to detect any eavesdropping activities and provide an effective security. …”
Get full text
Get full text
Thesis -
15
Detecting emotions and depression through voice
Published 2021“…A deep learning algorithm can detect emotion, including depression, using a voice signal. …”
Get full text
Get full text
Article -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
DATDroid : Dynamic Analysis Technique in Android Malware Detection
Published 2020“…During the classification 70% of the dataset was allocated for training phase and 30% for testing phase using machine learning algorithm. Our experimental results achieved an overall accuracy of 91.7% with lower false positive rates as compared to benchmarked method. …”
Get full text
Get full text
Get full text
Article -
19
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
20
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
Published 2012“…Anomaly detection systems can detect unknown worms but usually suffer from a high false alarm rate. …”
Get full text
Get full text
Get full text
Get full text
Thesis
