Search Results - bandwidth (((electron OR section) algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A modified Otsu's algorithm for improving the performance of the energy detector in cognitive radio by Onumanyi, A. J., Onwuka, Elizabeth Nonye, Aibinu, Abiodun Musa, Ugweje, Okechukwu C., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…In this paper, we present a modified Otsu's algorithm for solving the automatic threshold estimation problem in energy detection based Cognitive Radio (CR) application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A modified Otsu’s algorithm for improving the performance of the energy detector in cognitive radio by Onumanyi, A. J., Onwuka, Elizabeth Nonye, Aibinu, Abiodun Musa, Ugweje, Okechukwu C., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…In this paper, we present a modified Otsu’s algorithm for solving the automatic threshold estimation problem in energy detection based Cognitive Radio (CR) application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Biologically inspired network on chip fault tolerant algorithm using time division multiplexing by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The technique is fault tolerant as it detects and bypass the faulty interconnects. With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Article
  6. 6

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Elliptical ultra-wideband antenna sensor with modified time reversal algorithm for breast tumour localization by Hussein, Sameer Abdulateef

    Published 2022
    “…A novel weighted Time Reversal algorithm is introduced to improve the image quality along with removing the clutter in the imaging environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems by Uwaechia, Anthony Ngozichukwuka

    Published 2018
    “…Additionally, at BER value of 2×10−3 the proposed CoFA and SdMP algorithms for CE have around 9%, 14%, 19.5% and 25% and around 5%, 10%, 14% and 22.5% performance improvement when compared to FACS, gOMP, OMP and ROMP algorithms, respectively.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Distributed denial of service attack in HTTP/2: review on security issues and future challenges by Liang Ming, Leau, Yu-Beng, Ying Xie

    Published 2024
    “…This study examines the current state of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions in the field of attack detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks by Latif, Suhaimi A, Masud, Mosharrof Hussain, Anwar, Farhat, Alam, Md Khorshed

    Published 2013
    “…There are some Internet applications that require high bandwidth and therefore, the bandwidth of an individual interface need to be aggregated to form a high speedy logical link. …”
    Get full text
    Get full text
    Get full text
    Article