Search Results - (( java application optimisation algorithm ) OR ( software detection protocol algorithm ))

Refine Results
  1. 1
  2. 2

    Norms detection and assimilation in multi-agent systems: a conceptual approach by Ahmed Mahmoud, Moamin, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mohd Yusoff, Mohd Zaliman, Mustapha, Aida

    Published 2012
    “…In this technique, the software agent is equipped with an algorithm, which detects and analyzes the normative interactions between local agents. …”
    Get full text
    Book Section
  3. 3

    Norms detection and assimilation in multi-agent systems: A conceptual approach by Mahmoud M.A., Ahmad M.S., Ahmad A., Mohd Yusoff M.Z., Mustapha A.

    Published 2023
    “…In this technique, the software agent is equipped with an algorithm, which detects and analyzes the normative interactions between local agents. …”
    Conference paper
  4. 4
  5. 5
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Optimization of process allocation causes to decrease the network traffic and fairer allocation, and therefore,optimization of fault-tolerance. The new protocol is simulated with using the OPNET and the MATLAB software. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Two channel data acquisition system for heart sound segmentation algorithm based on instantaneous energy of electrocardiogram by Malarvili, M. B., J., M. Najeb, Ismail, Kamarulafizam

    Published 2003
    “…This paper presents the hardware design of 2- channel data acquisition system for heart sound and Electrocardiogram (ECG) to capture the heart sound and ECG simultaneously from patients; and software algorithm to detect the first heart sound (S1) and second heart sound(S2). …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17
  18. 18

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. The decision tree (DT) ML technique is optimized with pruning method which provides an attack detection accuracy of 96.5%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis