Search Results - (( model evaluation using algorithm ) OR ( way communication system algorithm ))
Search alternatives:
- way communication »
- model evaluation »
- evaluation using »
- system algorithm »
- using algorithm »
-
1
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
2
Offline handwriting recognition using Artificial Neural Network and Hidden Markov Model
Published 2002“…The latter shows integration of the ANN and HMM by using the gradient descent algorithm. Different topologies of the ANN have been investigated for modeling of junks. …”
Get full text
Get full text
Thesis -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…First, reviewing and classifying the current grid RD systems in such a way that may be useful for discussing and comparing them. …”
Get full text
Get full text
Thesis -
5
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…First, reviewing and classifying the current grid RD systems in such a way that may be useful for discussing and comparing them. …”
Get full text
Get full text
Thesis -
6
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
7
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
8
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
9
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…The resulting hand gesture recognition system is rigorously evaluated and compared to existing methods, demonstrating its effectiveness. …”
Get full text
Get full text
Get full text
Thesis -
10
A complexity-reduced digital predistortion for radio frequency power amplifier
Published 2016“…Therefore, it is essential that the power saved by using DPD is not spent on a high complexity DPD algorithm.In this thesis, a low-complexity DPD model is proposed, verified, and experimentally evaluated for linearizing power amplifiers with memory effects. …”
Get full text
Get full text
Thesis -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. …”
Get full text
Get full text
Get full text
Article -
18
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…The current research was carried out determine the mathematical modelling on one way communication between two parties using Kuwakado scheme (2018) method with the proposed system of key exchange on ECC using the operation in generating point. …”
Get full text
Get full text
Student Project -
19
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
text::Thesis -
20
Affine projection algorithm for speech enhancement using controlled projection order
Published 2020“…This research presents a development of the affine projection algorithm (APA) in voice communication applications. …”
Get full text
Get full text
Get full text
Article
