Search Results - (( parallel estimation method algorithm ) OR ( pattern detection service algorithm ))
Search alternatives:
- parallel estimation »
- estimation method »
- pattern detection »
- detection service »
- service algorithm »
- method algorithm »
-
1
Parallel visualization approach of a 3D heart model
Published 2008Get full text
Get full text
Conference or Workshop Item -
2
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Offline on the other hand, is a mode where adaptive algorithms cannot estimate the imperfections in parallel with the transmission. …”
Get full text
Get full text
Thesis -
3
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
4
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
5
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
6
DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection
Published 2021“…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
Get full text
Get full text
Get full text
Article -
7
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008“…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Face detection in image sequence / Noor Diana Abdullah
Published 2007Get full text
Get full text
Thesis -
11
Adaptive feature selection for denial of services (DoS) attack
Published 2017Get full text
Get full text
Conference or Workshop Item -
12
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
13
Image reconstruction using iterative transpose algorithm for optical tomography
Published 2007“…This paper describes a transpose algorithm for use with an optical tomography system. …”
Get full text
Get full text
Get full text
Article -
14
An enhanced android botnet detection approach using feature refinement
Published 2019“…The obtained results show that by using the additional features the detection accuracy improved. The experimental evaluation based on real-world benchmark datasets shows that the selected unique patterns can achieve high detection accuracy with low false positive rate. …”
Get full text
Get full text
Thesis -
15
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004“…An algorithm that definitely can satisfy the objectives is the Dynamic Integrated Systems Optimization and Parameter Estimation (DISOPE) algorithm. …”
Get full text
Get full text
Monograph -
16
-
17
Iterative methods for solving split common fixed point problems in Hilbert spaces
Published 2016“…In other words, we construct parallel and cyclic algorithms for solving the split common fixed point problems for strictly pseudocontractive mappings and prove the convergence results of these algorithms. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
20
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…Recently, one the most popular attack is denial of service (DoS) that attempt to be malicious pattern to compromise a server or a network resource. …”
Get full text
Get full text
Student Project
