Search Results - (( java implementation modified algorithm ) OR ( software selection packet algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance of various forecasting algorithms to reduce the number of transmitted packets by sensor node in wireless sensor networks by Husni, Muhammed Ihsan

    Published 2018
    “…The simulation experiments are done using MATLAB software for a variety of algorithms. The selected algorithms for the reduction algorithm in the transmissions include Move Average algorithm (MA), Autoregressive all-pole model parameters — Burg’s algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Dynamic channel selection for meshed wireless personal area network by Abdul Lateef, Ahmed

    Published 2015
    “…This thesis focused on the meshed WPAN to investigate and determine the possibility of exploiting the available increasing in wireless nodes to enhance the performance and increase the capacity for meshed WPAN. A Dynamic Channel Selection Algorithm has been suggested. This algorithm uses the available channels, which are five channels in the WPAN, to enable simultaneous transmission of two or more channels to achieve a high packet delivery ratio and better performance of the network especially when it uses applications that needs high traffic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET by JUBAIR, MOHAMMED AHMED, Mostafa, Salama A., ZEBARI, DILOVAN ASAAD, HARIZ, HUSSEIN MUHEE, ABDULSATTAR, NEJOOD FAISAL, HASSAN, MUSTAFA HAMID, ABBAS, ALI HASHIM, ABBAS, FATIMA HASHIM, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2022
    “…Subsequently, this research proposes a new routing protocol that combines the Quality of Service (QoS)-aware Cluster Head (CH) selection and hybrid cryptography named QoS+. The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
    Get full text
    Get full text
    Article
  19. 19

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs by JUBAIR, MOHAMMED AHMED, A. MOSTAFA, SALAMA, DZEBARI, DILOVAN ASAAD, MUHEE HARIZ, HUSSEIN, ABDULSATTAR, NEJOOD FAISAL, HASSAN, MUSTAFA HAMID, ABBAS, ALI HASHIM, HASHIM ABBAS, FATIMA, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2023
    “…Subsequently, this research proposes a new routing protocol that combines the Quality of Service (QoS)-aware Cluster Head (CH) selection and hybrid cryptography named QoS+. The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
    Get full text
    Get full text
    Article
  20. 20