Search Results - (( java implementation path algorithm ) OR ( using tls based algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- using tls »
- tls based »
-
1
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
Get full text
Get full text
Thesis -
2
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
4
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
5
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Compact broadband triple-ring five-port reflectometer for microwave brain imaging applications
Published 2019“…Genetic algorithm and quasi-Newton algorithm are used in optimizing the final prototype for operation in the frequency band used for brain microwave imaging. …”
Get full text
Get full text
Get full text
Article -
7
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
8
Position estimation comparison of a 3-D linear lateration algorithm with a reference selection technique
Published 2018“…The two five-GRS linear lateration algorithms chosen for comparison are based on single reference total least square (SF-TLS) and multiple reference least square (MF-LS) approaches. …”
Get full text
Get full text
Article -
9
Improvement of vertical height accuracy using data fusion technique for terrain mapping in oil palm plantation
Published 2018“…The result indicates that filtering algorithm in TerraScan was good enough to be used for TLS data in oil palm plantation. …”
Get full text
Get full text
Get full text
Thesis -
10
Encryption method for SCADA security enhancement
Published 2014“…Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
Get full text
Get full text
Get full text
Article -
11
Slope inspection system using image processed by machine learning algorithm to determine risk of slope failure
Published 2020“…The algorithm assesses the level of risk based on trained supervised images identified by experts in the field. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The proposed method involves utilising DNA-based components consisting of the nucleotides {A, T, G, C} to generate a novel Dynamic DNA-based S-Box. …”
Get full text
Get full text
Thesis -
13
Slope inspection system: using image processed by machine learning algorithm to determine risk of slope failure
Published 2020“…The algorithm assesses the level of risk based on trained supervised images identified by experts in the field. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
