Search Results - (( parallel distribution new algorithm ) OR ( pattern detection method algorithm ))

Refine Results
  1. 1

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…To achieve an optimum waiting and response time this thesis has proposed a new approach utilizing the aforementioned modelling, optimizing and partitioning algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    New Quarter-Sweep-Based Accelerated Over-Relaxation Iterative Algorithms and their Parallel Implementations in Solving the 2D Poisson Equation by Rakhimov, Shukhrat

    Published 2010
    “…The parallel strategies used in the new algorithms are based on the message latency minimization and processor-independent iterations.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Distributed generation with parallel connected inverter by Younis, U.A.A., Rahirn, N.A., Mekhilef, Saad

    Published 2009
    “…This paper presents the design and analysis of a new configuration of parallel connected inverter suitable for Distributed Generation Application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Parallel strategies on a distributed parallel computer system by Alias, Norma

    Published 2004
    “…The formulation of a new parallel iteration methods are created to solve the parabolic equations in one, two and three dimensions run on a distributed parallel computer systems on the homogeneous parallel machines with 20 PC Intel Pentium IV, speed 1.6MHz and with PVM application platform. …”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10

    WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm by Prajindra S.K., Tiong S.K., Johnny Koh S.P., Yap D.F.W.

    Published 2023
    “…The embedded GA optimization scheme was based on minimum downlink power consumption tailored for a WCDMA network that employs adaptive antennas in support of a heterogeneous user mix. The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
    Conference paper
  11. 11

    Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems by Hnaif, Adnan Ahmad Abdelfattah

    Published 2010
    “…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Effect Of The Addition Of Wastepaper To Concrete Mix by Shukeri, Ritzawaty Mohamad

    Published 2009
    “…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
    Get full text
    Get full text
    Thesis
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  14. 14

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Pembinaan dan pelaksanaan algoritma selari bagi kaedah kelas TTHS dan TTKS dalam menyelesaikan persamaan parabolik pada sistem komputer selari ingatan teragih by Alias, Norma

    Published 2004
    “…The compatibility of the parallel implementation of AGE on the distributed parallel computer system is also discussed. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Parallel Diagonally Implicit Runge-Kutta Methods For Solving Ordinary Differential Equations by Din, Ummul Khair Salma

    Published 2009
    “…All algorithms are written in C language and the parallel code is implemented on Sun Fire V1280 distributed memory system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Direct Block Methods for Solving Special Second Order Ordinary Differential Equations and Their Parallel Implementations by Yap, Lee Ken

    Published 2008
    “…Hence the last part of the thesis discusses the parallel execution of the codes. The parallel algorithms are written in C language and implemented on Sun Fire V1280 distributed memory system. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
    Get full text
    Get full text
    Thesis