Search Results - (( using communication using algorithm ) OR ( basic selection based algorithm ))
Search alternatives:
- using communication »
- communication using »
- using algorithm »
- basic selection »
- selection based »
-
1
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
Get full text
Get full text
Conference or Workshop Item -
2
FPGA implementation of the complex division in digital predistortion linearizer
Published 2010“…A few suitable algorithms should be selected and implemented in VHDL for evaluation. …”
Get full text
Get full text
Get full text
Article -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
5
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The interface selection algorithm was based on NEMO implementation structure using a technique of mutihoming which was extended to MIPv6 concepts The outcome of this research work are: a designed policy protocol for policy messages communication between the Mobile Router and the Home Agent, the framework is simulated using Network Simulator (NS2) with an extension of mobiwan, the result shows the end to end delay, average end to end delay, overhead, optimal routing path, average inter-packet latency and throughput of the developed system. …”
Get full text
Get full text
Thesis -
6
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…This research aims to increase the accuracy of node trustworthiness evaluation process in order to helps node to make more informed decision prior to establish secure communications. In order to achieve this, different sets of trust information including QoS, OSNs and ant colony system (ACS) algorithm are proposed to improve the selection of trustworthy node. …”
Get full text
Get full text
Get full text
Thesis -
7
Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems
Published 2016“…The proposed idea reduces the computational complexity, processing time and the side information matrix content, basically and ensures the results. The first proposed method, called Gray Code-based Phase sequence (GCP) is a new low complexity PAPR reduction scheme based on a Gray code structure and a similarity measurement block; included on two steps: firstly, selecting the phase sequences based on Gray codes and finally, evaluating the similarity between the input and the output of the Power Amplifier (PA), among the selected phase sequences in the previous step. …”
Get full text
Get full text
Thesis -
8
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…This paper presents the design of algorithm solution for selecting a planting lining technique. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
11
-
12
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…As the 50-50 probabilities for exploitation and exploration in the basic teaching learning-based optimization algorithm may be counterproductive, the Mamdani-type fuzzy inference system of the new algorithm takes these measures as a crisp inputs and generates selection as crisp output to choose either exploitation or exploration based on the current search requirement. …”
Get full text
Get full text
Get full text
Article -
13
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
Get full text
Get full text
Get full text
Thesis -
14
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
15
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
17
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Investigating computational thinking among primary school students in Terengganu using visual programming
Published 2022“…In addition to quantitative methods, a qualitative method of semi-structured interview based on the selected project was conducted after the students completed their projects to identify the strengths and difficulties, they had faced during the project creation. …”
Get full text
Get full text
Thesis -
19
Robust correlation feature selection based support vector machine approach for high dimensional datasets
Published 2025“…Correlation-based feature selection methods are popular tools used to select the most important variables to include the true model in the analysis of sparse and high-dimensional models. …”
Get full text
Get full text
Get full text
Article -
20
Dynamic communication performance enhancement in hierarchical torus network by selection algorithm
Published 2012“…It is found that the dynamic communication performance of an HTN using these adaptive routing algorithms are better than when the dimension-order routing is used, in terms of network throughput. …”
Get full text
Get full text
Get full text
Article
