Search Results - (( its application ((server algorithm) OR (bees algorithm)) ) OR ( _ detection system algorithm ))*
Search alternatives:
- server algorithm »
- system algorithm »
- its application »
- bees algorithm »
-
1
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
Get full text
Get full text
Monograph -
2
Home intruder detection system using machine learning and IoT
Published 2022“…HIDES is developed using the System Development Life Cycle (SDLC) approach. HIDES implements an object detection algorithm; Single-Shot Multibox Detection (SSD) in NVIDIA Jetson Nano to detect intruders through a camera connected to the system. …”
Get full text
Get full text
Get full text
Article -
3
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Popularity of P2P applications usage; majorly on file-sharing and video streaming has gained vast popularity and so rapid which wake up network service providers of its dominance. …”
Get full text
Get full text
Thesis -
4
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
6
Monitoring cathodic protection system for underground pipeline
Published 2013“…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. An electronic prototype were designed, fabricated and tested to monitor the pipelines drain point voltage, transformer rectifier voltage, shunt current, humidity and temperature using a local server system whereby all the data collected are stored on a local storage before synchronizing to the internet’s web server database using the cloud system. …”
Get full text
Get full text
Thesis -
7
Design And Implementation Of Human Crowd Density Estimation System With Energy Harvesting In Wireless Sensor Network Platform
Published 2017“…To mitigate casualties in crowd-related disaster, radio frequency-based crowd density estimation and monitoring system is being developed as a safety tool. Current systems have limited monitoring capabilities; low size of crowd monitored, low detection range, high number of transceivers required and finite operational lifetime. …”
Get full text
Get full text
Thesis -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Finally, in Chapter 5, we discussed the conclusions and the future work of our study: RAN-LSH classifier, malicious spam email detection system and DDoS backscatter detection system.…”
Get full text
Get full text
Thesis -
9
-
10
-
11
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
12
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
13
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The approaches were tested using detailed discrete-event simulation model which was developed encompassing messaging system that includes error, delay and mobility models to characterize the performance benefits of the proposed algorithms in comparison to ReMHoc protocol. …”
Get full text
Get full text
Thesis -
14
Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm
Published 2025Get full text
Get full text
Get full text
Get full text
Book Chapter -
15
-
16
Protein Conformantional Search Using Bees Algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025“…While numerous studies have proposed intrusion detection systems based on supervised learning models, a critical limitation persists. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Artificial Bee Colony Algorithm for Pairwise Test Generation
Published 2017“…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
Get full text
Get full text
Get full text
Article -
19
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Local search manoeuvres recruitment in the bees algorithm
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item
