Search Results - parallel distribution ((matching algorithm) OR (means algorithm))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems by Hnaif, Adnan Ahmad Abdelfattah

    Published 2010
    “…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…Parallel power loads anomalies are processed by a fast-density peak clustering technique that capitalizes on the hybrid strengths of Canopy and K-means algorithms all within Apache Mahout's distributed machine-learning environment. …”
    Article
  3. 3

    Effect Of The Addition Of Wastepaper To Concrete Mix by Shukeri, Ritzawaty Mohamad

    Published 2009
    “…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt by Akhtar, M.N., Ahmed, W., Kakar, M.R., Bakar, E.A., Othman, A.R., Bueno, M.

    Published 2020
    “…The results showed that the PKIP algorithm decreases the execution time up to 30 to 46 if compared with the sequential k means algorithm when implemented using multiprocessing and distributed computing. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…It is because the parallel mechanism is able to handle high-speed streaming data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…The work initially investigates the feasibility of using the DC distribution system to power the locally available AC appliances, that are analyzed and evaluated individually to match the DC supply either by direct coupling or some modification. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Optimization of Workload Allocation Problem in a Network of Heterogeneous Computer Systems by Rahela, Abdul Rahim

    Published 2005
    “…A new algorithm of workload allocation scheme using First Come First Serve discipline in conjunction with optimization of GE queueing systems is proposed for minimizing mean queue length and mean response time in a network of computer systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Investigation of QAM based on mean square error (MSE) channel estimation (CE) for MIMO-OFDM pilot based system / Mohd Ariff Ibrahim by Ibrahim, Mohd Ariff

    Published 2013
    “…The Least Square Error (LSE) and Discrete Fourier Transform (DFT) BER are not shown because these are other CE techniques and Mean Square Error (MSE) is used just by applying the algorithm from Least Square Error (LSE) and converted into MSE with combination of few complex matrix correlations.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Generic DNA encoding design scheme to solve combinatorial problems by Rofilde, Hasudungan

    Published 2015
    “…The complexity of combinatorial problems is classified as NP meaning that algorithms are yet to exist to efficiently solve the problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Communication and computation rate-cheating problems in divisible load scheduling: revisited by Ghanbari, Shamsollah, Othman, Mohamed, Sembiyev, Ordabay, Umarova, Zhanat

    Published 2015
    “…In the real applications, the processors may cheat the algorithm which means that the processors might not report their true computation or communication rates. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An adaptive controller of hydro generators for smart grid application in Malaysia by Mohamad, H., Bakar, A.H.A., Ping, H.W., Mokhlis, Hazlie

    Published 2010
    “…The controller has been modeled considering the existing Malaysia' distribution network of mini hydro power plant connected in parallel to the grid. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    3d Morphing And Shape Transformation Using Slices by Yasmin, Shamima

    Published 2009
    “…Most of the existing shape transformation algorithms involve a lot of user intervention, do not scale well when the number of input objects is more than two and are not scalable in parallel and distributed computing environment whenever needed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-criteria divisible load scheduling in binary tree network by Ghanbari, Shamsollah

    Published 2016
    “…The traditional divisible load scheduling assumes that the processors report their true computation and communication rates, i.e., they do not cheat the algorithm. In the real applications, the processors may cheat the algorithm, which means, the processors might not report their true computation or communication rates. …”
    Get full text
    Get full text
    Thesis