Search Results - (( attack detection queue algorithm ) OR ( leave application matching algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network by Najmun, Nisa, Adnan Shahid, Khan, Zeeshan, Ahmed, Najmun, Nisa

    Published 2024
    “…These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. However, for the non-intact leaves such as the deformed, partial and overlapped leaves that largely exist in practice, the global shape features are not efficient and these methods are not applicable.The dried leave parts and noise can degrade identification results and affect the quality of the extracted features which lead to poor classification results. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…RD is about locating an appropriate resource/service type that matches the user’s application requirements. This is very important, as resource reservation and task scheduling are based on it. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…RD is about locating an appropriate resource/service type that matches the user's application requirements. This is very important, as resource reservation and task scheduling are based on it. …”
    Get full text
    Get full text
    Thesis