Search Results - (( normal detection method algorithm ) OR ( parallel distribution function algorithm ))
Search alternatives:
- parallel distribution »
- function algorithm »
- normal detection »
- method algorithm »
-
1
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023Subjects:Conference paper -
2
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
4
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
5
High performance visualization of human tumor growth software
Published 2008“…The platform for high performance computing of the parallel algorithms run on a distributed parallel computer system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems
Published 2007“…This paper focuses on the implementation of parallel algorithm for the simulation of brain tumours growth using one dimensional parabolic equation, design on a distributed parallel computer system. …”
Get full text
Get full text
Article -
7
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…The first step lies at the modelling of parallel applications running on heterogeneous parallel computers. …”
Get full text
Get full text
Thesis -
8
High performance simulation for brain tumours growth using parabolic equation on heterogeneous parallel computer system
Published 2007“…This paper focuses on the implementation of parallel algorithm for the simulation of brain tumours growth using one dimensional parabolic equation, design on a distributed parallel computer system. …”
Get full text
Get full text
Get full text
Article -
9
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
Conference paper -
10
A critical analysis of simulators in grid
Published 2015“…In parallel and distributed computing environment such as "The Grid", anticipating the behavior of the resources and tasks based on certain scheduling algorithm is a great challenging.Thus, studying and improving these types of environments becomes very difficult. …”
Get full text
Get full text
Get full text
Article -
11
Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt
Published 2020“…The results showed that the PKIP algorithm decreases the execution time up to 30 to 46 if compared with the sequential k means algorithm when implemented using multiprocessing and distributed computing. …”
Get full text
Get full text
Article -
12
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…This research introduces Adaptive Grid-Meshed-Buffer Stream Clustering Algorithm (AGMB), that addresses these weaknesses and improves outlier detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
15
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
16
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The User Profile Filter (UPF) was proposed to aid the SVM algorithm to classify the captured traffics into normal and abnormal behavior. …”
Get full text
Get full text
Get full text
Thesis -
17
A clustering-based method for outlier detection under concept drift
Published 2024“…Anomaly-based strategies, diverging from traditional signature-based methods, gain popularity for their effectiveness in detecting new attacks. …”
Get full text
Get full text
Get full text
Article -
18
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
19
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To find the proper detection threshold a series of tests on different scenarios of normal and attack traffic were conducted. …”
Get full text
Get full text
Thesis -
20
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
Get full text
Get full text
Article
