Search Results - ((detection algorithm) OR (((replication algorithm) OR (connection algorithm))))
Search alternatives:
- replication algorithm »
- connection algorithm »
-
1
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…Therefore, an action must be taken to detect and solve this problem. A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
Get full text
Get full text
Thesis -
2
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…It achieves faster time execution and cost minimization than that other replication processes. This algorithm also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent failure connection algorithm for detecting internet worms
Published 2009“…In this paper, we show that our algorithm can detect new types of worms. This paper shows that intelligent Failure Connection Algorithm (IFCA) operation is faster than traditional algorithm in detecting worms.…”
Get full text
Get full text
Get full text
Article -
4
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…In this paper, we present a routing algorithm based on enhanced simulated annealing technique to provide the connection between nodes in a semi-diagonal torus (SD-Torus) network. …”
Get full text
Get full text
Get full text
Article -
5
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
6
Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks
Published 2010“…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
Get full text
Get full text
Article -
7
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…This algorithm is based on two detection schemes; namely active and passive. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
9
Signal detection algorithm for cognitive radio using singular value decomposition
Published 2011“…This paper highlights an algorithm for detecting the presence of wireless signal using the Singular Value Decomposition (SVD) technique.We simulated the algorithm to detect common digital signals in wireless communication to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in detecting a signal without knowing the properties of the transmitted signal.The performance of the algorithm is better compared to the favorable energy detection.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown.This is also the advantage of the algorithm since any signal would interfere and subsequently affect the quality of service (QoS) of the IEEE 802.22 connection.Furthermore, the algorithm performed better in the low signalto-noise ratio (SNR) environment.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Improving The Algorithm To Detect Internet Worms
Published 2008“…The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Eye closure and open detection using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected components utilisation
Published 2014“…Eye closure detection is an important operation prior to carry out the main algorithm such as iris recognition algorithms, and eye tracking algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
12
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
13
Partitioning detection and connectivity restoration algorithm for WSAN
Published 2010“…This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
15
A new corner detection algorithm for chain code representation.
Published 2005“…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
Get full text
Get full text
Article -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…All the replication servers established its connection through interfaces. …”
Get full text
Get full text
Thesis -
17
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…The combination of Genetic Algorithm, Immune Algorithm and local search has produced good detection with acuracy rate of 98.91% and has the potential to be further investigated for other research areas.…”
Get full text
Get full text
Get full text
Article -
18
Server scanning worm detection by using intelligent failure connection algorithm
Published 2010“…Our proposal decreases the false alarm in Intelligent Failure Connection Algorithm (IFCA). Our proposal also works when the computer is infected by the worm and IFCDA detected the worm, many computers that are connected through the internet will receive the warning by using our proposal. …”
Get full text
Get full text
Get full text
Article -
19
Retrieval Of Environmental Parameters Over Water Areas Using MODIS Data
Published 2012“…The presences of cirrus cloud have been detected utilizing gradient technique algorithm. The algorithm is based on the gradient connecting the 1.38 and 1.24 μm lines of the log– log graph of apparent reflectance against the MODIS wavelength. …”
Get full text
Get full text
Thesis -
20
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…However, the genetic algorithm path planning approach in the previous works requires a preprocessing step that captures the connectivity of the free-space in a concise representation. …”
Get full text
Get full text
Get full text
Article
