Search Results - (( java application server algorithm ) OR ( (variable OR variables) detection learning algorithm ))
Search alternatives:
- application server »
- detection learning »
- learning algorithm »
- java application »
- server algorithm »
-
1
Pure intelligent monitoring system for steam economizer trips
Published 2023“…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
Conference Paper -
2
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
3
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
4
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
5
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
6
-
7
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
Get full text
Get full text
Thesis -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
10
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009Get full text
Get full text
Article -
11
Pure intelligent monitoring system for steam economizer trips
Published 2017“…It is shown that ANN can be implemented for monitoring any process faults in thermal power plants. Better speed of learning algorithms by using the Extreme Learning Machine has been approved as well. © The authors, published by EDP Sciences, 2017.…”
Get full text
Get full text
Article -
12
-
13
ECG-based driving fatigue detection using heart rate variability analysis with mutual information
Published 2023“…These features are combined with features obtained from heart rate variability analysis in the time, frequency, and non-linear domains. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS
Published 2011“…For this hybrid intelligent system, the selection of appropriate variables from hundreds of boiler operation variables with optimal neural network topology combinations to monitor boiler trips was a major concern. …”
Get full text
Get full text
Thesis -
15
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
17
Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study
Published 2022“…For this reason, this study compares eleven machine learning algorithms to determine which one produces the best accuracy for predicting thyroid risk accurately. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques
Published 2025“…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
Get full text
Get full text
Monograph
