Search Results - (( parallel detection system algorithm ) OR ( java application tools algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems by Hnaif, Adnan Ahmad Abdelfattah

    Published 2010
    “…Therefore, the performance of the existing algorithms needs to be improved both in sequential and parallel to enhance the speed of the detection engine used in SNORT-NIDS. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
    Article
  6. 6

    Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE) by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…This study focuses on the implementation of parallel algorithm for the simulation of tumor growth using two dimensional Helmholtz’s wave equation on a distributed parallel computing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  7. 7

    Effect Of The Addition Of Wastepaper To Concrete Mix by Shukeri, Ritzawaty Mohamad

    Published 2009
    “…Therefore, the performance of the existing algorithms needs to be improved both in sequential and parallel to enhance the speed of the detection engine used in SNORT-NIDS. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of an automatics parallel parking system for nonholonomic mobile robot by Mohd Fairuz , Abdollah, Syed Najib , Syed Salim, Irma Wani , Jamaludin, Muhammad Nizam , Kamarudin

    Published 2011
    “…This paper depicts the development of backward automatic parallel parking system for nonholonomic mobile robot. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Skin region detector for real time face detection system by Mohd Mustafah, Yasir, Azman, Amelia Wong

    Published 2012
    “…In the implementation, the region of interest is detected using two algorithms, running in parallel. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. In this paper, an improved intrusion detection algorithm for multiclass classification was presented and discussed in detail. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The development of the prediction system is the combinations of the parallel algorithms, open source software on Linux environment and distributed multiprocessor system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    NEUCOMP2 - parallel neural network compiler by Sulaiman, Md. Nasir, Evans, D. J.

    Published 1996
    “…NEUCOMP2 was developed and run on the Sequent Balance 8000 computer system at Parallel Algorithm Research Centre, U.K.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…The data flow in GASOS is appropriate in pipelining and parallelization to reduce operational time. A new GASOS-based MUD hardware design for SDMA-OFDM systems is proposed using FPGA architecture. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Active contour model on digital mammograms using low-cost parallel computing systems by Ibrahim, Arsmah, Alias, Norma, Sulaiman, Hanifah, Yasiran, Siti Salmah

    Published 2009
    “…Parallel Computing System (PCS) is currently being used widely in many applications of complex problems in image processing. …”
    Get full text
    Book Section