Search Results - (( based optimization max algorithm ) OR ( pattern detection packet algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…As ADS can process massive volumes of packets, the amount of processing time needed to discover the pattern of the packets is also increased accordingly and resulting in late detection of the attack packets. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system by Alsahag, Ali Mohammed Mansoor, Mohd Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal

    Published 2011
    “…In this paper, we propose a fair bandwidth assignment algorithm that allocates the bandwidth among different services classes based on a hierarchical scheduler. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Network intrusion detection and alert system by To, Jin Yi

    Published 2024
    “…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…In the second experiment, the detection of the specific type of voice disorders has been carried out through twoclass pattern classification problems. …”
    Get full text
    Thesis
  9. 9

    Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin by Alsahag, Ali Mohammed, Mohd Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal

    Published 2014
    “…One example of such a network is called WiMAX which is driven by WiMAX Forum based on IEEE 802.16 Wireless MAN standard. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cross-layer design using multi-channel system in WiMAX mesh networks by Al-Hemyari, Ali, Ng, Chee Kyun, Noordin, Nor Kamariah, Ismail, Alyani, Khatun, Sabira, Jamuar, Sudhanshu Shekhar

    Published 2008
    “…The WiMAX mesh networks based on IEEE 802.16 standard is a key topology for the next generation wireless networking. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments by Haque, Najmul, Zafril Rizal, M. Azmi, Murad, Saydul Akbar

    Published 2026
    “…This study provides a comprehensive analysis and comparison of six prevalent scheduling algorithms, namely FCFS, SJF, LJF, EDF, Max-Min, and PSO, under varying cloudlet loads of 200,400,600,800, and 1000. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems by Fayaz, Muhammad, Arshad, S, Shah, A.S, Shah, Asadullah

    Published 2016
    “…Hence, these approaches regularly fail to provide optimal results on specific graph instances. These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A lightweight graph-based pattern recognition scheme in mobile ad hoc networks. by Raja Mahmood, Raja Azlina, Muhamad Amin, Anang Hudaya, Amir, Amiza, Khan, Asad I.

    Published 2012
    “…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
    Get full text
    Book Section
  14. 14

    Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks by Al-Humairi, Ali Zuhair Abdulameer

    Published 2009
    “…WiMAX (Worldwide Interoperability for Microwave Access) based wireless mesh network (WMN) aims to provide broadband wireless last-mile access. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Improving QoS Of WiMAX By ondemand bandwidth allocation based on PMP mode by Sun, Zhen Tao, Gani, Abdullah, Sun, Xiu Ying, Liu, Ning

    Published 2011
    “…In order to improve the QoS of WiMAX demand, the total capacity of WiMAX system must be optimized. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Energy-efficient base station transmission design for green 5G massive MIMO and hybrid networks by Khodamoradi, Vahid

    Published 2021
    “…Then, a new corresponding iterative EE optimization algorithm is proposed based on the BSTPA model to further improve the system’s EE. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…FADRR is fully dynamic with fuzzy logic based approach and adaptive deadline-based scheme for various service class traffics in the base station (BS). …”
    Get full text
    Get full text
    Thesis