Search Results - bandwidth ((prediction algorithm) OR (detection algorithm))
Search alternatives:
-
1
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
2
Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system
Published 2024Subjects:Conference Paper -
3
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…FPF of SVM have merged the analyzed results of flexible packet filtering with support vector machine algorithm to get better classification of the captured network traffics and to detect anomalies. …”
Get full text
Get full text
Get full text
Thesis -
4
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following study, the radio bandwidth's energy consumption is the target under study, which in turn is predicted to optimize WSN.…”
Article -
5
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item -
6
From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks
Published 2017“…The evolution trends are spectrum sensing, prediction algorithm and recently, geo-location database technique. …”
Get full text
Get full text
Get full text
Article -
7
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…The proposed approach, Energy-Aware Multi-Dimensional Online Bin Packing (EAMDOBP), was tested against Power-aware best fit decreasing algorithm (PABFD), Modified Worst Fit decreasing algorithm (MWFD) and Hybrid Local Regression Host Overload Detection (HLRHOD). …”
Get full text
Get full text
Get full text
Thesis -
8
Adaptive Quality Of Service Call Admission Control With User Mobility Prediction For Multimedia Traffic Over Wireless Networks
Published 2003“…Based on the mobility prediction, bandwidth is reserved to guarantee the uninterrupted hand off process. …”
Get full text
Get full text
Thesis -
9
Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks
Published 2008“…The second proposed scheme is a bandwidth reservation scheme based on Mobility Prediction Scheme (MPS). …”
Get full text
Get full text
Thesis -
10
Enhanced Bandwidth Based Handover Decision Making Algorithm For Small Cell Wireless Networks
Published 2020“…To overcome this problem, this paper proposed a new handover decision making algorithm that integrates the traveling distance prediction technique with the bandwidth based handover algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…More importantly, integrating the marker with scheduler algorithms in order to reduce the traffic loss and improve bandwidth fairness. …”
Get full text
Get full text
Thesis -
12
Machine learning‐based approach for bandwidth and frequency prediction of circular SIW antenna
Published 2025“…Among them, the Extra Trees Regression model achieved over 98% accuracy, with errors below 0.1% for both resonance frequency and bandwidth predictions. The approach was validated through Computer Simulation Technology (CST) simulations and ML-based predictions, both demonstrating strong agreement. …”
Get full text
Get full text
Get full text
Article -
13
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
14
Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri
Published 2007“…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
Get full text
Get full text
Thesis -
15
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
16
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
17
Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture.
Published 2011“…The latter considers the frequent-path adaptability and both of them together satisfy both frequent-path and proportionalfragment adaptability aspects; v) A Fuzzy Decentralization Decision Making algorithm (FDDM) is presented based on the fuzzy logic to choose a suitable method of decentralization that satisfies the three adaptability aspects frequent-path,proportional- fragment and available-bandwidth; and, vi) an algorithm is introduced for wiring of dynamic fragments. …”
Get full text
Get full text
Thesis -
18
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…This algorithm can also work for big number of SUs that detect the OFDM signal. …”
Get full text
Get full text
Thesis -
19
Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion
Published 2017“…The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
Get full text
Get full text
Thesis -
20
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Therefore, an active available bandwidth estimation technique was incorporated in the proposed solution. …”
Get full text
Get full text
Thesis
