Search Results - (( java pattern classification algorithm ) OR ( using internet issues algorithm ))
Search alternatives:
- pattern classification »
- issues algorithm »
- using internet »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
3
-
4
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…We use the Internet for many things, such as research, banking, and commercial sales. …”
Get full text
Get full text
Thesis -
5
-
6
Content caching in ICN using Bee-Colony optimization algorithm
Published 2015“…Different caching issues has raised concern about the content flooded all over the Internet.In line with the challenges, Bee-Colony Optimization Algorithm (B-COA) has been proposed in this paper to avail content on the Internet with less referral cost and heavy monopoly of data on hosts.It is believed that the advantages of the grouping and waggle phase could be used to place the contents faster in ICN.…”
Get full text
Get full text
Get full text
Article -
7
Simulation Of Token Bucket Algorithm For Network Traffic Performance
Published 2020“…However, implementing the basic mechanism of traffic shaping cannot solve this issue. In this research, the optimal size of bucket in Token Bucket Algorithm(TBA)is used as one of the techniques in traffic shaping. …”
Get full text
Get full text
Get full text
Article -
8
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…This technique is challenged by the nature of IoT technology and perceived data, as well as by human differences, which necessitated additional processing tasks to select significant features for the learning algorithms. In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
12
E-MyKad : An Online Identity Representation System for Malaysia’s Internet Community
Published 2013“…On the first part of this research paper, the author will prove that there is the need of one system or platform that can be used to verify user‟s identity on the internet. …”
Get full text
Get full text
Final Year Project -
13
An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network
Published 2021“…This study introduces an email detection model that is designed based on use of an improved version of the grasshopper optimization algorithm to train a Multilayer Perceptron in classifying emails as ham and spam. …”
Get full text
Get full text
Conference or Workshop Item -
14
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
15
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…The Internet has rapidly grown due to more online users using to interact with people, communicate, seek jobs, find partners and shop. …”
Get full text
Get full text
Thesis -
16
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…Although there are many methods of ensuring network security in IoT, such as using encryption, firewalls, and intrusion detection systems, the issue of security is still not been fully solved. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Optimization grid scheduling with priority base and bees algorithm
Published 2014“…The main aim of this current research to propose an optimization of the initial scheduler for grid computing using the bees algorithm. Modern algorithms informed this research. …”
Get full text
Get full text
Get full text
Thesis -
19
Honey bee based trust management system for cloud computing
Published 2011“…In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…For this issue, this study proposes using the naïve approach prune algorithm and using Personal agents to reduce the reachability time in calculating between the nodes and to remove unnecessary edges, minimizing the attack graph’s complexity. …”
Get full text
Get full text
Get full text
Get full text
Article
