Search Results - (( java implication based algorithm ) OR ( pre evaluation protocol algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…There is a large variation of neuroimaging approaches that are utilized for pre-surgical evaluation depending on the protocol of each epilepsy surgery center. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…Thus, leading to the improvement of the throughput while adhering to the delay pre-requisites. The performance evaluation of the proposed algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…In addition, most of VANETs clustering approaches use simple evaluation methodology where most of the approaches disregard a significant issue in the evaluation methodology. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
    Get full text
    Get full text
    Thesis