Search Results - (( using feature protocol algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- protocol algorithm »
- learning algorithm »
- feature protocol »
- java application »
-
1
-
2
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
Published 2019“…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
Get full text
Get full text
Thesis -
3
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
Article -
4
-
5
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…Cloud computing services are popular for its ease of use and dynamic scalability with great reliability feature. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. …”
Get full text
Get full text
Get full text
Thesis -
7
Automated feature extraction on brain MRI images for predicting multiple sclerosis patient disability
Published 2022“…Furthermore, they were using manual and semi-automated features extraction. …”
Get full text
Get full text
Get full text
Thesis -
8
Automated feature extraction for predicting multiple sclerosis patient disability using brain MRI
Published 2022“…This study aims to predict MS patients' disability using fully automated feature extraction, single MRI scan, single MRI protocols and without patient follow-up. …”
Get full text
Get full text
Article -
9
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…The efficiency of EFS features is assessed in two ways: (1) by comparing them to the relevant related work’s features of outliers and flow using four feature importance methods, and (2) by analyzing the classification performance in the scenarios with and without EFS features. …”
Get full text
Get full text
Thesis -
10
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
12
Dynamic object replica placement using underlying routing protocols: ensuring the reliability
Published 2013“…In this paper, it is discussed that reliability can be assured if we use replica placement algorithm along with the EIGRP (Enhanced Interior Gateway Routing Protocol). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Efficient vehicle routing optimization for autistic users / Abdulrahman Hasan Mohammed Shabalah
Published 2020“…The new proposed algorithm is called Autistic-Features Ant Colony (AFAC). …”
Get full text
Get full text
Get full text
Thesis -
14
Brain Machine Interface Controlled Robot Chair
Published 2010“…The BMI controls the joystick of the robot chair using a shared control algorithm. Real-time experiments are also presented using 10 trained and 5 untrained subjects to validate the applicability of the brain machine interface. …”
Get full text
Thesis -
15
-
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
17
A new visual simulation tool for performance evaluation of MANET routing protocols
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
18
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Adaptive reservation TDMA protocol for wireless multimedia traffic
Published 2001“…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
Get full text
Get full text
Get full text
Article -
20
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. …”
Get full text
Get full text
Get full text
Get full text
Article
