Search Results - (( data replication method algorithm ) OR ( parameter detection packet algorithm ))
Search alternatives:
- parameter detection »
- replication method »
- method algorithm »
- detection packet »
- packet algorithm »
-
1
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
2
Dynamic replication algorithm in data grid: Survey
Published 2008“…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
3
Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis
Published 2016“…In order to alleviate the time-variant characteristics of the wavelet packet transform coefficients, statistical parameters of wavelet packet coefficients are calculated. …”
Get full text
Get full text
Thesis -
4
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
5
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
Get full text
Get full text
Thesis -
6
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
9
New synchronization protocol for distributed system with TCP extension
Published 2013“…Thus, the new protocol is available to the communicating packets across all computer networks. The new messages and parameters could add to the available option part in the TCP packet header format, which has some free places. …”
Get full text
Get full text
Thesis -
10
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
11
-
12
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Usually, it is hard to detect DDoS backscatter from the unlabeled packets, where an expert is needed to analyze every packet manually. …”
Get full text
Get full text
Thesis -
13
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…The results ofall measured quality parameters have…”
Get full text
Get full text
Thesis -
14
-
15
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…To address this issue, various data pre-processing methods called Feature Selection (FS) techniques have been presented in the literature. …”
Get full text
Get full text
Article -
16
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…In addition, this technique has achieved excellent accuracies (ROC = 95%) over other methods used. Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
Get full text
Get full text
Get full text
Article -
17
Energy-Aware Clustering Routing for Mobile Ad-Hoc Sensor Networks (MASNETS)
Published 2020“…Different experiments have been done using different parameters and numbers of results have been achieved to analyze the performance of algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. This is done based on the specific parameters such as (number of malicious nodes, number of normal nodes, and maximum speed). …”
Get full text
Get full text
Get full text
Thesis -
20
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…K-means clustering has become the most applied algorithm in discovering classes in an unsupervised scenario. …”
Get full text
Get full text
Get full text
Get full text
Article
