Search Results - (( java application testing algorithm ) OR ( parameter detection service algorithm ))
Search alternatives:
- application testing »
- parameter detection »
- testing algorithm »
- detection service »
- service algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
7
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…Thus, a 5G-MIMO based CR communication system has been developed to enhance the spectrum by employing a spectrum sensing (SS) algorithm. This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
Get full text
Get full text
Article -
10
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
11
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
12
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
13
Application of neural networks in early detection and diagnosis of parkinson's disease
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…The proposed algorithm may assist the telecommunication service provider to initiate automated cable faults identification and troubleshooting in the DSL Access Network System.…”
Get full text
Get full text
Get full text
Article -
18
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…The pre-processor, processes the collected data statistically and derives the final variable values. These parameters are the inputs of the detector engine. In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
Get full text
Get full text
Thesis -
19
-
20
