Search Results - (( java implementation svm algorithm ) OR ( based interactive protocol algorithm ))
Search alternatives:
- interactive protocol »
- java implementation »
- implementation svm »
- protocol algorithm »
- svm algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
3
Deniable authentication protocol based on factoring and discrete logarithm problems
Published 2022“…In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. …”
Get full text
Get full text
Conference or Workshop Item -
4
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
5
Reliable Fuzzy-Based Multi-Path Routing Protocol Based on Whale Optimization Algorithm to Improve QOS in 5G Networks for IOMT Applications
Published 2024“…The Whale Optimization Algorithm (WOA) enhances the routing protocol performance. …”
Article -
6
Position-based QoS multicast routing protocol for mobile Ad Hoc Networks
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
7
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…In this paper, a Cross-layer design among Network, MAC and Physical layers based on Threshold Multipath Routing Protocol (CTMRP) is proposed. …”
Get full text
Get full text
Get full text
Article -
8
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
9
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…Every ad hoc routing protocol has their own advantages based on the performances in the network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
Get full text
Get full text
Thesis -
11
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…Voice over Internet Protocol (VoIP) is a technology that allows the transmission of voice packets over Internet Protocol (IP). …”
Get full text
Get full text
Thesis -
12
-
13
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…A parametric model based on Hill Muscle Model (HMM) to estimate the knee joint moment is developed for both experiments protocols. …”
Get full text
Get full text
Thesis -
14
Energy efficient cluster head distribution in wireless sensor networks
Published 2013“…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
Get full text
Get full text
Get full text
Thesis -
15
A review energy-efficient task scheduling algorithms in cloud computing
Published 2023Conference Paper -
16
Enchancing QoS protection in MPLS networks
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
17
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Deployment models will be analyzed to address users' security concerns with cloud computing based on inter-cloud interaction and with multiple clouds to cooperate. …”
Get full text
Get full text
Thesis -
18
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…In addition, the well-known alternating-offers protocol is used to govern the interactions. To generate Pareto-optimal offer with one-side incomplete information, at first,an algorithm is presented to generate multi-issue offers with perfect (complete)information. …”
Get full text
Get full text
Thesis -
19
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. …”
Get full text
Get full text
Thesis -
20
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…Today the Internet serves many purposes, from social interaction to information search and conducting business activities to smart connectivity. …”
Get full text
Get full text
Conference or Workshop Item
