Search Results - call data processing

Search alternatives:

Refine Results
  1. 1

    Polymorphism and danger susceptibility of system call DASTONs by Maarof, Mohd. Aizaini, Iqbal, Anjum

    Published 2007
    “…This shows that computational data (system calls in this case) exhibit biological properties when processed with DT point of view.…”
    Get full text
    Get full text
    Book Section
  2. 2

    Online evaluation system for student's project by Ismail, Khairil Izwani

    Published 2007
    “…This process seems tedious and cannot be done at the evaluators convenience.Centralizing data to databases is more efficient for storing data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Preliminary study of ODSee System : Understanding type of switches data format and viable online transfer mechanism / Nor'aini Ahmad by Ahmad, Nor'aini

    Published 2004
    “…The system developed will help the network and billing group to manage call data transfer and billing processing more efficiently and effectively. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Voice over internet protocol (VoIP) i Talk Technology / Latifah Mohd. Yusoff by Mohd. Yusoff, Latifah

    Published 2002
    “…The actual VoIP network diagram , call processing, call flow and call routing based on the i Talk Technology (product of Telecom Malaysia Bhd.) being analyzed. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Development of a hybrid method by data envelopment analysis and analytic network process for project selection by Mojahed, Majid

    Published 2014
    “…This model will result from the integration of a decision tool called the Analytic Network Process and a data analysis model called Data Envelopment Analysis. …”
    Get full text
    Get full text
    Thesis
  6. 6

    User behavior based call admission control for traffic steering in Wi-Fi/cellular networks by Lim, Yun Yi, Mohd Shariff, Azizul Rahman, Mohd Zaini, Khuzairi

    Published 2015
    “…In the traffic steering process, network selection is the most vital process, as it affects the user’s network experience. …”
    Get full text
    Get full text
    Book Section
  7. 7

    Travel booking management system for Sriamera Holidays / Muhammad Faqrul Ariffin Mohd Fadil by Mohd Fadil, Muhammad Faqrul Ariffin

    Published 2022
    “…Data and information handling using emails and calls is an invitation for human error, data redundancy and data lose to occur. …”
    Get full text
    Get full text
    Student Project
  8. 8

    A machine learning framework to classify Southeast Asian echolocating bats by Natalie, Yoh, Tigga, Kingston, Ellen, McArthur, Aylen, Oliver E., Huang, Joe Chun-Chia, Emy Ritta, Jinggong, Faisal Ali, Anwarali Khan, Lee, Benjamin P.Y.H, Mitchell, Simon L., Bicknell, Jake E.

    Published 2022
    “…To address this, we outline a semi-automated framework for classifying bat calls in Southeast Asia and demonstrate how this can reliably speed up manual data processing. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A methodology to detect intrusion using system call based on discriminant analysis by Abdullah, Abdul Hanan, Dahlan, Dahliyusmanto

    Published 2003
    “…We will investigate a new method for detecting intrusion at the level of privilege process. This method bases on the number of system call during a user's network activity on host machine. …”
    Get full text
    Conference or Workshop Item
  10. 10

    ICT application in teaching and learning Mandarin in Malaysia secondary schools by Chew, Fong Peng

    Published 2009
    “…The results showed that both teachers and students realized the importance of CALL appliance in teaching Mandarin. Mostly, respondents agreed that ICT appliances give more positive effects in helping teachers during the process of teaching and learning Mandarin. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An Approach to the Development of Hybrid Architecture of Expert Systems by Yahia, Moawia Elfaki

    Published 1999
    “…Two methods based on rough set analysis were developed and merged with the development of neural expert systems forming a new hybrid architecture of expert systems called a rough neural expert system. The first method works as a preprocessor for neural network. within the architecture, and it is called a pre-processing rough engine, while the second one was added to the architecture for building a new structure of inference engine called a rough neural inference engine. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of bugs reporting system for home pricing / Fazrul Shah Ab. Karim by Ab. Karim, Fazrul Shah

    Published 2004
    “…A new computerised system called Bugs Reporting System was developed to replace the manual reporting process. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Data Processing of an Energy Management System Using the Google Cloud Platform by Ghovind, Dina

    Published 2017
    “…However, endeavours to monitor and manage energy have been neglected due to the lack of ability of current energy management systems to acquire and process energy data accordingly. The advent of the Internet of Things, cloud computing capabilities as well has Big Data has brought about a new means of collecting and processing data; all acquired in realtime, subsequently making data analysis possible. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Indexing strategy for big data processing: A case study of PingER by Adamu, Fatima Binta

    Published 2015
    “…BIND supports parallel distribution of data and performs processing in a MapReduce fashion. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An energy conservation indexing method for secure XML data broadcast in mobile wireless networks by Fathi, Leila, Ibrahim, Hamidah, Mirabi, Meghdad

    Published 2014
    “…Experimental results show that the use of the SecNode structure for secure XML data broadcast improves the performance of XML query processing in terms of tuning time and therefore reduces the power consumption at mobile clients.…”
    Get full text
    Get full text
    Article
  16. 16

    An air indexing method for encrypted XML data broadcast in mobile wireless network by Fathi, Leila, Ibrahim, Hamidah, Mirabi, Meghdad

    Published 2013
    “…In this paper, we define a new unit structure for XML stream called SecNode which supports data confidentiality of XML data over the wireless broadcast channel. …”
    Get full text
    Conference or Workshop Item
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Monograph
  19. 19

    UMTS Core Network Simulator / Too Sea Chen by Too, Sea Chen

    Published 2003
    “…IMT2000 specification has some platforms all called 3G, and since they meet up particular data throughput necessities, the decisions are enormous and vital for an operator to put together. …”
    Get full text
    Get full text
    Thesis
  20. 20

    On-line analytical processing tools for land revenue management system by Sahibuddin, Shamsul, Zakaria, Nor Hawaniah

    Published 2000
    “…A functional data warehouse organizes and stores all of the available data needed for informational, analytical processing over a historical time perspective. …”
    Get full text
    Get full text
    Conference or Workshop Item