Search Results - (( java application optimisation algorithm ) OR ( based detection drops algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- based detection »
- detection drops »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
3
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
4
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…This study proposed a Conditional Hybrid Intrusion Detection (CHID) by combining the flow-based with packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
5
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…The filter algorithm is based on an enhanced harmonic mean filter algorithm. …”
Get full text
Get full text
Thesis -
6
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…Additionally, we find that some algorithms are more sensitive to data leakage than others, as seen by the drop in model accuracy when built without leakage. …”
Get full text
Get full text
Article -
7
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Based on You Only Look Once (YOLO) v5, A cloud-based real-time hardhat-wearing compliance detection system was proposed to detect workers not wearing hardhats in power construction sites. …”
Get full text
Get full text
Thesis -
8
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
Get full text
Book Section -
9
Performance enhancement of DCCP TCP - like over long delay link networks
Published 2012“…Instead of halving the current congestion window when congestion events are detected, the reduction of current congestion window drop has been shown to improve the DCCP TCP-like throughput with minimal drop packet percentage.…”
Get full text
Get full text
Get full text
Article -
10
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
11
-
12
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…In recent years, detection methods based on machine learning techniques are widely deployed in order to improve the efficiency of anomaly-based detection. …”
Get full text
Get full text
Thesis -
13
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Objectives: An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm, signal drop and network breakdown. …”
Get full text
Get full text
Get full text
Article -
14
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…The tumor cells split too often, without any order and drop the ability to control their growths. In this book, the invention of the early detection of brain tumors growth is presented. …”
Get full text
Get full text
Get full text
Get full text
Book -
15
Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.]
Published 2025“…As a result of these benefits, a plethora of machine learning-based solutions for occupancy detection has been developed in the literature. …”
Get full text
Get full text
Get full text
Article -
16
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
17
Development of a lower-extremities exoskeleton for postural-sway in sit-to-stand movement
Published 2025“…The system integrates an ESP32 microcontroller, IMU-based sway detection, and a threshold-based control algorithm for real time actuation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…Using the trained multi-nets ANN model, two case studies were conducted pertaining to the detection of drop in compressor flow capacity and compressor fouling in an industrial 18.7-MW twin-shaft gas turbine engine. …”
Get full text
Get full text
Article -
19
Artificial neural network for anomalies detection in distillation column
Published 2017“…Based on RMSE minimization, the (6-8-6) net serves as the best choice for the case studied for efficient fault detection. …”
Get full text
Get full text
Article -
20
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item
