Search Results - (( java pattern classification algorithm ) OR ( using internet based algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…The objective of this research is to characterize inbound internet traffic collected on real live IP-based campus network, to develop Adaptive Policing and Shaping Algorithms with percentage level on Inbound Traffic based on traffic characterization and to compare the policing and shaping performance on bandwidth used, processing time and packet loss. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…The research scope is based on collected of internet traffic on IP-based network real live traffic at 16 Mbps speed line. …”
    Get full text
    Get full text
    Article
  6. 6

    Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications by Hamza Awad, Hamza Ibrahim, Sulaiman, Mohd Nor, Izzeldin, I. Mohd, Mohamed Saad, Mahoub, Haitham, A. Jamil

    Published 2014
    “…The SSPC algorithm was used to classifying four types of Internet applications in two stages, initially offline and later online. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Makespan algorithms and heuristic for internet-based collaborative manufacturing process using bottleneck approach by Bareduan, Sallehahmad, Hasan, Sulaiman

    Published 2010
    “…This paper presents makespan algorithms and scheduling heuristic for an Internet-based collaborative design and manufacturing process using bottleneck approach. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…The methodology employed in this study is quantitative, focusing on the analysis of Internet financial crime using random forest and association rules based on data processing. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof by Md Taujuddin, Nik Shahidah Afifi, Abdullah, Abdul Hanan, Maarof, Mohd Aizaini

    Published 2006
    “…The Internet Protocol Security (IPSec) is a standard-based method that being used to protect the information that traverse in the Internet networking without expensive cost or complex modification on Internet application itself. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm by Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2013
    “…Instead of random Gaussian signal, we trained the codebook using LBG algorithm for Surah Al-Fatihah, and used the trained codebook for the whole Quran. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Intrusion detection system for the internet of things based on blockchain and multi-agent systems by Liang, Chao, Shanmugam, Bharanidharan, Azam, Sami, Karim, Asif, Islam, Ashraful, Zamani, Mazdak, Kavianpour, Sanaz, Idris, Norbik Bashah

    Published 2020
    “…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Only the authorized receiver can decrypt the ciphertext with the secret key(s) to obtain the plaintext. Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
    Get full text
    Get full text
    Article