Search Results - (( java application optimisation algorithm ) OR ( changes detection packet algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- changes detection »
- java application »
- detection packet »
- packet algorithm »
-
1
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…The second is RED (Random Early Detection), which drops incoming packets at a certain probability.…”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
4
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks
Published 2015“…However, in MASNETs, the main reason of the topology change is caused by the node movement. Since the sensor nodes are limited in power supply and have a low radio frequency coverage, they are easily losing their connection with neighbours and difficult to transmit their packets towards sink node. …”
Get full text
Get full text
Proceeding -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Usually, it is hard to detect DDoS backscatter from the unlabeled packets, where an expert is needed to analyze every packet manually. …”
Get full text
Get full text
Thesis -
9
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
Published 2010“…A change in one bit within an incoming packet may lead to serious security preaches. …”
Get full text
Get full text
Thesis -
10
A hybrid rate control mechanism for forwarding and congestion control in named data network
Published 2020“…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
12
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…Few examples are energy detection, cyclostationary detection, matched filter detection, etc. …”
Get full text
Get full text
Get full text
Thesis -
13
Energy-Aware Clustering Routing for Mobile Ad-Hoc Sensor Networks (MASNETS)
Published 2020“…If this information is not properly handled, energy can be wasted due to the changes in network topology. Hence, an efficient and energy-aware clustering routing is required to reduce energy consumption and reliably transmit data to the sink node in the event of frequent topology changes in energy-constrained MASNETs. …”
Get full text
Get full text
Get full text
Thesis -
14
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…This could be expected from the interaction between Medium Access Control (MAC) layer and Application layer, where the proposed agent adapts the voice packet size at the Application layer according to the change of MAC transmission data rate to avoid network congestion from happening. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
Get full text
Get full text
Thesis -
18
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…Furthermore, PMTRF exhibits its resilience and adaptability to changing network conditions, accurately detects faulty switches, which is useful for fore-cast switch failures based on switch reliability within the network. …”
Get full text
Get full text
Get full text
Thesis
