Search Results - (( parallel prevention method algorithm ) OR ( variable detection packet algorithm ))
Search alternatives:
- variable detection »
- prevention method »
- method algorithm »
- detection packet »
- packet algorithm »
-
1
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
Get full text
Get full text
Thesis -
2
Local search approaches for patient scheduling problem in parallel operating theatre
Published 2020“…Tests are conducted for the proposed methods to look for a method that has the ability to prevent delays of patients with a lower total cost. …”
Get full text
Get full text
Thesis -
3
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
Get full text
Get full text
Thesis -
4
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Department of Defense and launched in the eighties to the world. Even so, it parallels the evolution of these methods to penetrate systems. …”
Get full text
Get full text
Get full text
Thesis -
5
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…Results show that in 96.7% of studied cases, the proposed method can significantly prevent machine over allocating in cellular manufacturing systems. …”
Get full text
Get full text
Thesis -
6
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
7
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
8
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
9
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…However, the manual method is time-consuming, tedious, labour-intensive and inter-variability. …”
Get full text
Get full text
Book Section -
10
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…However, the manual method is time-consuming, tedious, labour-intensive and intervariability. …”
Get full text
Get full text
Thesis
