Search Results - (( pattern detection protocol algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- protocol algorithm »
- pattern detection »
- java application »
-
1
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Protein microarray-based IgE immunoassay for allergy diagnosis
Published 2017Get full text
Get full text
Book Section -
5
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. …”
Get full text
Get full text
Get full text
Article -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
Published 2019“…On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks.…”
Get full text
Get full text
Monograph -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
Physical fatigue prediction based on heart rate variability (HRV) features in time and frequency domains using artificial neural networks model during exercise
Published 2019“…HRV and HRmax were found as significant parameters to detect fatigue by differentiate its pattern in pre and post exercise. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
