Search Results - (( java pattern classification algorithm ) OR ( using internet application algorithm ))
Search alternatives:
- pattern classification »
- application algorithm »
- internet application »
- using internet »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
3
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
4
-
5
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014“…Based on certain priority rules, SSPC makes classification decisions for each flow. The SSPC algorithm was used to classifying four types of Internet applications in two stages, initially offline and later online. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Algorithm for the legal regulation of internet financial crime
Published 2024“…Further research is proposed to delve deeper into the application of these algorithms in real-world scenarios and explore additional methods to enhance the prevention and management of Internet financial crime.…”
Get full text
Get full text
Get full text
Article -
7
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…The Internet Protocol Security (IPSec) is a standard-based method that being used to protect the information that traverse in the Internet networking without expensive cost or complex modification on Internet application itself. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
11
-
12
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…As the Internet grows and becomes universally available, it becomes very important to deal with real time service delivery to application such as IP telephony. …”
Get full text
Get full text
Thesis -
13
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
14
Intelligent DNA signature detection for internet worms
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
15
A new fair marker algorithm for DiffServ networks
Published 2008“…The paper design and implement the algorithm with extensive simulations using NS-2 simulator to compare the proposed algorithm with previous algorithms. …”
Get full text
Get full text
Article -
16
-
17
-
18
-
19
-
20
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006Get full text
Get full text
Get full text
Proceeding Paper
