Search Results - (( pre processing protocol algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- protocol algorithm »
- java application »
- pre processing »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
4
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…The accuracy of ESL depends on all the stages of data processing including: head model reconstruction, signal pre-processing and inverse solution. …”
Get full text
Get full text
Thesis -
5
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…Transfer learning is a type of machine learning that is viable and durable in image classification with limited training images. This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
Get full text
Get full text
Get full text
Article -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The industrial datasets are pre-processed, profiled and the abnormality is analyzed with DPI. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…The majority of the approaches follow heuristic-based protocol combined with various connected phases and processes, such as cluster formation, cluster head selection, and cluster maintenance. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
An e-voting application using cryptography technology
Published 2020“…The second is the relatively simple captcha (Completely Automated Public Turing test to tell Computers and Humans Apart). This process that requires users to enter a pre-determined code to authenticate users is not a robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis
