Search Results - call data processing
Search alternatives:
- call data »
- processing »
-
1
Polymorphism and danger susceptibility of system call DASTONs
Published 2007“…This shows that computational data (system calls in this case) exhibit biological properties when processed with DT point of view.…”
Get full text
Get full text
Book Section -
2
Online evaluation system for student's project
Published 2007“…This process seems tedious and cannot be done at the evaluators convenience.Centralizing data to databases is more efficient for storing data. …”
Get full text
Get full text
Thesis -
3
Preliminary study of ODSee System : Understanding type of switches data format and viable online transfer mechanism / Nor'aini Ahmad
Published 2004“…The system developed will help the network and billing group to manage call data transfer and billing processing more efficiently and effectively. …”
Get full text
Get full text
Thesis -
4
Voice over internet protocol (VoIP) i Talk Technology / Latifah Mohd. Yusoff
Published 2002“…The actual VoIP network diagram , call processing, call flow and call routing based on the i Talk Technology (product of Telecom Malaysia Bhd.) being analyzed. …”
Get full text
Get full text
Student Project -
5
Development of a hybrid method by data envelopment analysis and analytic network process for project selection
Published 2014“…This model will result from the integration of a decision tool called the Analytic Network Process and a data analysis model called Data Envelopment Analysis. …”
Get full text
Get full text
Thesis -
6
User behavior based call admission control for traffic steering in Wi-Fi/cellular networks
Published 2015“…In the traffic steering process, network selection is the most vital process, as it affects the user’s network experience. …”
Get full text
Get full text
Book Section -
7
Travel booking management system for Sriamera Holidays / Muhammad Faqrul Ariffin Mohd Fadil
Published 2022“…Data and information handling using emails and calls is an invitation for human error, data redundancy and data lose to occur. …”
Get full text
Get full text
Student Project -
8
A machine learning framework to classify Southeast Asian echolocating bats
Published 2022“…To address this, we outline a semi-automated framework for classifying bat calls in Southeast Asia and demonstrate how this can reliably speed up manual data processing. …”
Get full text
Get full text
Get full text
Article -
9
A methodology to detect intrusion using system call based on discriminant analysis
Published 2003“…We will investigate a new method for detecting intrusion at the level of privilege process. This method bases on the number of system call during a user's network activity on host machine. …”
Get full text
Conference or Workshop Item -
10
ICT application in teaching and learning Mandarin in Malaysia secondary schools
Published 2009“…The results showed that both teachers and students realized the importance of CALL appliance in teaching Mandarin. Mostly, respondents agreed that ICT appliances give more positive effects in helping teachers during the process of teaching and learning Mandarin. …”
Get full text
Get full text
Conference or Workshop Item -
11
An Approach to the Development of Hybrid Architecture of Expert Systems
Published 1999“…Two methods based on rough set analysis were developed and merged with the development of neural expert systems forming a new hybrid architecture of expert systems called a rough neural expert system. The first method works as a preprocessor for neural network. within the architecture, and it is called a pre-processing rough engine, while the second one was added to the architecture for building a new structure of inference engine called a rough neural inference engine. …”
Get full text
Get full text
Thesis -
12
Development of bugs reporting system for home pricing / Fazrul Shah Ab. Karim
Published 2004“…A new computerised system called Bugs Reporting System was developed to replace the manual reporting process. …”
Get full text
Get full text
Thesis -
13
Data Processing of an Energy Management System Using the Google Cloud Platform
Published 2017“…However, endeavours to monitor and manage energy have been neglected due to the lack of ability of current energy management systems to acquire and process energy data accordingly. The advent of the Internet of Things, cloud computing capabilities as well has Big Data has brought about a new means of collecting and processing data; all acquired in realtime, subsequently making data analysis possible. …”
Get full text
Get full text
Final Year Project -
14
Indexing strategy for big data processing: A case study of PingER
Published 2015“…BIND supports parallel distribution of data and performs processing in a MapReduce fashion. …”
Get full text
Get full text
Get full text
Thesis -
15
An energy conservation indexing method for secure XML data broadcast in mobile wireless networks
Published 2014“…Experimental results show that the use of the SecNode structure for secure XML data broadcast improves the performance of XML query processing in terms of tuning time and therefore reduces the power consumption at mobile clients.…”
Get full text
Get full text
Article -
16
An air indexing method for encrypted XML data broadcast in mobile wireless network
Published 2013“…In this paper, we define a new unit structure for XML stream called SecNode which supports data confidentiality of XML data over the wireless broadcast channel. …”
Get full text
Conference or Workshop Item -
17
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Get full text
Thesis -
18
A study on advanced statistical analysis for network anomaly detection
Published 2005“…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
Get full text
Monograph -
19
UMTS Core Network Simulator / Too Sea Chen
Published 2003“…IMT2000 specification has some platforms all called 3G, and since they meet up particular data throughput necessities, the decisions are enormous and vital for an operator to put together. …”
Get full text
Get full text
Thesis -
20
On-line analytical processing tools for land revenue management system
Published 2000“…A functional data warehouse organizes and stores all of the available data needed for informational, analytical processing over a historical time perspective. …”
Get full text
Get full text
Conference or Workshop Item
