Search Results - (( parallel estimation method algorithm ) OR ( pattern detection service algorithm ))

Refine Results
  1. 1
  2. 2

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Offline on the other hand, is a mode where adaptive algorithms cannot estimate the imperfections in parallel with the transmission. …”
    Get full text
    Get full text
    Thesis
  3. 3

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection by A. Mostafa, Salama, Al-Azzawi, Ziadoon Kamil Maseer, Bahaman, Nazrulazhar, Yusof, Robiah, Musa, Omar, Al-rimy, Bander Ali Saleh

    Published 2021
    “…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi by Hosseiny Fatemi, Mohammad Reza

    Published 2012
    “…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…The obtained results show that by using the additional features the detection accuracy improved. The experimental evaluation based on real-world benchmark datasets shows that the selected unique patterns can achieve high detection accuracy with low false positive rate. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of optimization Alghorithm for uncertain non-linear dynamical system by Abdul Aziz, Mohd. Ismail, Yaacob, Nazeeruddin, Mohd. Said, Norfarizan, Hamzah, Nor Hazadura

    Published 2004
    “…An algorithm that definitely can satisfy the objectives is the Dynamic Integrated Systems Optimization and Parameter Estimation (DISOPE) algorithm. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Iterative methods for solving split common fixed point problems in Hilbert spaces by Mohammed, Lawan Bulama

    Published 2016
    “…In other words, we construct parallel and cyclic algorithms for solving the split common fixed point problems for strictly pseudocontractive mappings and prove the convergence results of these algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…Recently, one the most popular attack is denial of service (DoS) that attempt to be malicious pattern to compromise a server or a network resource. …”
    Get full text
    Get full text
    Student Project