Search Results - (( variable detection path algorithm ) OR ( protocol distributed learning algorithm ))
Search alternatives:
- distributed learning »
- variable detection »
- learning algorithm »
- detection path »
- path algorithm »
-
1
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
3
-
4
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
5
A stable energy balancing based clustering routing protocol for IoUT using meta-heuristic technique
Published 2024“…The proposed method enable to optimization the IoUT energy efficiency by balancing strategy that uses the Q-learning algorithm to ensure more balanced distribution of tasks across UNs and CHs. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Energy efficient cluster head distribution in wireless sensor networks
Published 2013“…PSO is lightweight heuristic optimization algorithm with each CH will move towards the best solutions by individual interaction with one another while learning from their own experience. …”
Get full text
Get full text
Get full text
Thesis -
7
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
8
LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri
Published 2017“…In order to remove the uninformative variables, cumulative adaptive reweighted sampling (CARS) has been performed. …”
Get full text
Get full text
Thesis -
9
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2017“…In order to remove the uninformative variables, variable selection using cumulative adaptive reweighted sampling (CARS) has been performed. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2024“…In order to remove the uninformative variables, variable selection using cumulative adaptive reweighted sampling (CARS) has been performed. …”
Article -
12
Review of energy conservation using duty cycling schemes for IEEE 802.15.4 wireless sensor network (WSN)
Published 2014“…This paper reviews several duty cycle mechanisms in WSN such as Duty Cycle Learning Algorithm, adaptive media access control (MAC) protocol for efficient IEEE 802.15.4 (AMPE), distributed duty cycle management (DDCM), distributed duty cycle management low power broadcast (DDCM + LPB) and distributed beacon only period. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
Get full text
Get full text
Thesis -
15
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…On top of that, the existing analysis tools and algorithms did not consider the data generated by sensory devices connected to the Internet. …”
Get full text
Get full text
Conference or Workshop Item
