Search Results - (( network detection path algorithm ) OR ( java application optimized algorithm ))

Refine Results
  1. 1

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network by Najm Us, Sama, Kartinah, Zen, Atiq Ur, Rahman, Aziz Ud, Din

    Published 2019
    “…In this paper a novel energy efficient routing hole detection (EEHD) algorithm is presented, on the detection of routing hole, the periodic re-clustering is performed to avoid the long detour path. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Monkeypox disease detection using Convolutional Neural Network (CNN) / Nur Farhain Humaira Ghanami by Ghanami, Nur Farhain Humaira

    Published 2024
    “…Thus, this research project aims to develop a prototype for detecting Monkeypox Disease Detection using Convolutional Neural Network (CNN) and detect monkeypox disease, which can assist in reducing its spread and improve patient outcomes. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    AUTOMATED GUIDED ROBOT (AGR) by Abd Rahim, Mohd Azlan Shah

    Published 2007
    “…The paper describes the network algorithms developed and used in the design process of the AGR including simulations and circuit designs done for the prototype. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    HTS : a hierarchical method for load balancing in autonomous networks. by Ahmad Zukarnain, Zuriati, Udzir, Nur Izura, Othman, Mohamed

    Published 2008
    “…Proposed algorithm fulfills at two steps. Firstly overload detection function through an explorer algorithm to construct overloaded link table due to disruption link. …”
    Get full text
    Get full text
    Article
  17. 17

    A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan by Nauman , Khan

    Published 2024
    “…Furthermore, PMTRF exhibits its resilience and adaptability to changing network conditions, accurately detects faulty switches, which is useful for fore-cast switch failures based on switch reliability within the network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20