Search Results - bandwidth ((((electron algorithm) OR (extraction algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A modified Otsu's algorithm for improving the performance of the energy detector in cognitive radio by Onumanyi, A. J., Onwuka, Elizabeth Nonye, Aibinu, Abiodun Musa, Ugweje, Okechukwu C., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…In this paper, we present a modified Otsu's algorithm for solving the automatic threshold estimation problem in energy detection based Cognitive Radio (CR) application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A modified Otsu’s algorithm for improving the performance of the energy detector in cognitive radio by Onumanyi, A. J., Onwuka, Elizabeth Nonye, Aibinu, Abiodun Musa, Ugweje, Okechukwu C., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…In this paper, we present a modified Otsu’s algorithm for solving the automatic threshold estimation problem in energy detection based Cognitive Radio (CR) application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abdul Rahman, Nor Farahaida

    Published 2014
    “…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Biologically inspired network on chip fault tolerant algorithm using time division multiplexing by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Article
  7. 7

    Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong by Lam , Wai Leong

    Published 2006
    “…This project looks into various data compression technique and when to use them, with specifically focus on ii evaluating the performance of existing data compression and extraction algorithms that best suit scientific dataset. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Elliptical ultra-wideband antenna sensor with modified time reversal algorithm for breast tumour localization by Hussein, Sameer Abdulateef

    Published 2022
    “…A novel weighted Time Reversal algorithm is introduced to improve the image quality along with removing the clutter in the imaging environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems by Uwaechia, Anthony Ngozichukwuka

    Published 2018
    “…Additionally, at BER value of 2×10−3 the proposed CoFA and SdMP algorithms for CE have around 9%, 14%, 19.5% and 25% and around 5%, 10%, 14% and 22.5% performance improvement when compared to FACS, gOMP, OMP and ROMP algorithms, respectively.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Evaluation of rehearsal effects of multimedia content based on EEG using machine learning algorithms by Mazher, M., Aziz, A.A., Malik, A.S.

    Published 2017
    “…The set of spectral features that are used for analysis are based on the intensity weighted mean frequency (IWMF), its bandwidth (IWBW), and spectral power density (PSD). …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Distributed denial of service attack in HTTP/2: review on security issues and future challenges by Liang Ming, Leau, Yu-Beng, Ying Xie

    Published 2024
    “…This study examines the current state of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions in the field of attack detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20