Search Results - (( _ application matching algorithm ) OR ( things application testing algorithm ))*

Refine Results
  1. 1
  2. 2

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Mohammed Saleh Ahmed, Ali, Ali Majeed Alhammadi,, Nafea, Ahmad Khalaf, Bashar, Mostafa, Salama A.

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Khalaf, Bashar Ahmad, Mostafa, Salama A.

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…To improve the UHDS16 algorithm, 8 × 8 block-matching technique has been tested. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14
  15. 15
  16. 16

    A Study On The Application Of Gravitational Search Algorithm In Optimizing Stereo Matching Algorithm’s Parameters For Star Fruit Inspection System by Zainal Abidin, Amar Faiz, Mohd Ali, Nursabillilah, Mat Zain, Norlina, Abdul Majid, Masmaria, Rifin, Rozi, Kadiran, Kamaru Adzha, Mohd Mokji, Ahmad Musa, Tan, Kok, Amirulah, Rahman

    Published 2018
    “…This paper reports the result obtained by implementing Gravitational Search Algorithm for tuning Stereo Matching Algorithm’s parameters for the application star fruit inspection system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    GPU-based odd and even hybrid string matching algorithm by Rahbari, Ghazal, Abdul Rashid, Nur’Aini, Husain, Wahidah

    Published 2016
    “…Experimental results indicate that the performance of the hybrid string matching algorithms has been improved, and the speedup, which has been obtained, is considerable enough to suggest the GPU as the suitable platform for these hybrid string-matching algorithms.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Application of Evolutionary Algorithm for Assisted History Matching by Zahari, Muhammad Izzat

    Published 2014
    “…In this project, we will define and discuss the application of evolutionary algorithm in assisted history matching. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2018
    “…In addition, it is expected that it can be applied in real-time application. In this study, Simulated Kalman Filter (SKF) is applied to image template matching application as the optimization algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20