Search Results - (( java location based algorithm ) OR ( software mitigation method algorithm ))
Search alternatives:
- software mitigation »
- mitigation method »
- method algorithm »
- java »
-
1
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…To improve SDN's resilience and performance, early detection, mitigation strategies, and structured approaches are necessary. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
11
IoT-based botnet attacks systematic mapping study of literature
Published 2024journal::journal article -
12
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…It has been utilized to demonstrate the effectiveness of the PSO method to improve the voltage profile and minimize the cost by mitigating the total losses of the network.…”
Get full text
Get full text
Get full text
Thesis -
13
Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region
Published 2016“…The result shows the barrier in suggested location can effectively aid in rockfall hazard mitigation. The outcomes of this study prove the ability of the proposed and applied methods to make valid detection and prediction for rockfall phenomena. …”
Get full text
Get full text
Thesis -
14
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…—In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. …”
Get full text
Get full text
Get full text
Article -
15
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. …”
Get full text
Get full text
Article -
16
-
17
-
18
An analytical tool for computing perimeter based on visual and coordinates analysis
Published 2024“…Leveraging advanced mathematical algorithms, including a straightforward formula for determining distances between points, PeriGo ensures precise results while mitigating the risk of human error. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
20
