Search Results - (( java application optimisation algorithm ) OR ( software detection protocol algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- software detection »
- protocol algorithm »
- java application »
-
1
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
2
Norms detection and assimilation in multi-agent systems: a conceptual approach
Published 2012“…In this technique, the software agent is equipped with an algorithm, which detects and analyzes the normative interactions between local agents. …”
Get full text
Book Section -
3
Norms detection and assimilation in multi-agent systems: A conceptual approach
Published 2023“…In this technique, the software agent is equipped with an algorithm, which detects and analyzes the normative interactions between local agents. …”
Conference paper -
4
-
5
Intelligent DNA signature detection for internet worms
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
7
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems
Published 2023Conference paper -
10
New synchronization protocol for distributed system with TCP extension
Published 2013“…Optimization of process allocation causes to decrease the network traffic and fairer allocation, and therefore,optimization of fault-tolerance. The new protocol is simulated with using the OPNET and the MATLAB software. …”
Get full text
Get full text
Thesis -
11
Network tool for preventing DDOS attacks on cloud computing
Published 2015Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
-
13
Two channel data acquisition system for heart sound segmentation algorithm based on instantaneous energy of electrocardiogram
Published 2003“…This paper presents the hardware design of 2- channel data acquisition system for heart sound and Electrocardiogram (ECG) to capture the heart sound and ECG simultaneously from patients; and software algorithm to detect the first heart sound (S1) and second heart sound(S2). …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Smart and energy aware routing for the internet of mobile things
Published 2021“…The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. The decision tree (DT) ML technique is optimized with pruning method which provides an attack detection accuracy of 96.5%. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Comparative evaluation of anomaly-based controller area network IDS
Published 2023Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis
