Search Results - (( _ application out algorithm ) OR ( iot applications ((tree algorithm) OR (bees algorithm)) ))*
Search alternatives:
- iot applications »
- application out »
- tree algorithm »
- bees algorithm »
- out algorithm »
-
1
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Our system achieved an overall accuracy of 98, outperforming baseline models that used more advanced algorithms such as Random Forest and XGBoost. Our enhanced Gini index feature selection method allowed us to select only 13 out of 45 security features, significantly reducing the data dimensionality and avoiding overfitting issues. …”
Get full text
Get full text
Article -
2
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
3
Intersection Features For Android Botnet Classification
Published 2019“…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
4
-
5
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
Get full text
Get full text
Thesis -
7
-
8
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Optimal power flow using the Jaya algorithm
Published 2016“…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…In this thesis, the applications of a number of well-known metaheuristic algorithms for solving engineering problems have been considered. …”
Get full text
Get full text
Thesis -
11
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This paper generally analyzed and branch out algorithms to perceive their limitations and delimitation. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Tracking The Eyes Using Interdependence Mean Shift Tracking Algorithm With Appropriate Information Provided
Published 2016“…The human eye tracking algorithm is very important, especially in the facial analysis application. …”
Get full text
Get full text
Get full text
Article -
14
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012Get full text
Get full text
Conference or Workshop Item -
15
Noise reduction techniques in ECG signal
Published 2023Get full text
Get full text
Get full text
Article -
16
-
17
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
-
19
Symbiotic organisms search optimization algorithm in cloud computing: a nature-inspired meta-heuristic
Published 2022“…This paper proposes to investigate symbiotic organisms search algorithms used in handling various optimisation problems in different fields to bring out strengths and weaknesses of the existing algorithms as well as to point out future directions for the upcoming studies in the domain. …”
Get full text
Get full text
Article -
20
