Search Results - (( data replication path algorithm ) OR ( variable detection packet algorithm ))
Search alternatives:
- variable detection »
- replication path »
- detection packet »
- packet algorithm »
- path algorithm »
-
1
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
Get full text
Get full text
Thesis -
2
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The system is then used in path prediction mode for reconstructing the missing parts of the trajectory when actual positioning data is unavailable. …”
Get full text
Get full text
Thesis -
3
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
Published 2025“…Experimental results demonstrate that BVAC sustains fault tolerance, achieves cloud database replication efficiency, and sustains high data availability via multiple valid quorum paths. …”
Get full text
Get full text
Get full text
Article -
4
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
Get full text
Get full text
Thesis -
5
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2016“…The paper emphases on replicating data packets and distribute them to different relays. …”
Get full text
Get full text
Get full text
Article -
6
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2015“…The paper emphases on replicating data packets and distribute them to different relays. …”
Get full text
Get full text
Get full text
Article -
7
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Revolutionizing energy infrastructure: Automated route planning for underground transmission lines in Phnom Penh
Published 2024“…Multiple algorithms are evaluated to identify the most effective solution to this design’s inherent shortest-path problem. …”
Get full text
Get full text
Get full text
Article -
9
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…The evaluation states that the existing agent-based steering model computes the complete set of collision-free paths with the least travel time among agents to make path decisions based on updated information. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
11
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis
