• No results found

network-based techniques

Practical Network-Based Techniques for Mobile Positioning in UMTS

Practical Network-Based Techniques for Mobile Positioning in UMTS

... additional network elements, which in a synchronized manner transmit DL (downlink) sequences that the UE can utilize to complement standardized OTDOA ...IPDL-based techniques, avail- ability of ...

15

Volatility Forecasting using Machine Learning and Time Series Techniques

Volatility Forecasting using Machine Learning and Time Series Techniques

... learning techniques such as Naïve Bayes,Neural Network based techniques time series techniques like ARIMA, ARFIMA, Random Walk forecast, Mean forecast, Holt Winter forecast, Bats and ...

9

An Approach to Enhance Multimedia Security in Cloud Computing

An Approach to Enhance Multimedia Security in Cloud Computing

... This paper has presented the security model for multimedia cloud computing based on DES, 2-Fish, Genetic Algorithm and neural network based techniques. Earlier majority of work has been done ...

7

A generalized procedure in designing recurrent neural network identification and control of time varying delayed nonlinear dynamic systems

A generalized procedure in designing recurrent neural network identification and control of time varying delayed nonlinear dynamic systems

... neural network is developed to accommodate the on-line identification, which the weights of the neural network are iteratively and adaptively updated through the model ...designed based on the ...

20

Network Level Anomaly Detection System with Principal Component Analysis

Network Level Anomaly Detection System with Principal Component Analysis

... in network has an increasing number of security ...on network is an intellectual ...suitable network security approaches (IDS-Intrusion Detection System) is a severe ...challenge. Based on the ...

7

Network Security Using Encryption Techniques

Network Security Using Encryption Techniques

... In our modern age of telecommunications and the Internet, information has become a precious commodity. Sometimes it must therefore be kept safe from stealing - in this case, loss of private information to an ...

5

Wireless Sensor Network Based on Sensor Localization Techniques and WSNGA
                 

Wireless Sensor Network Based on Sensor Localization Techniques and WSNGA  

... Wireless sensor network in sensor nodes are deployed in real geographical environment and observe some physical behaviors. WSNs have many analytical challenges. Sensors are small device in size, low cost ...

5

Implementation of Different Ant based Techniques for Network Load Analysis

Implementation of Different Ant based Techniques for Network Load Analysis

... specific network, but original route algorithms (such as hierarchical routing algorithm) in multi level and multi- domain can't compute the global optimization ...

5

Implementation of Neural Network Back Propagation Training Algorithm on FPGA

Implementation of Neural Network Back Propagation Training Algorithm on FPGA

... Neural Network (ANN) chip, which can be trained to implement certain ...neural network to function as basic digital gates and also for image ...neural network chip that is trainable on-line is ...

7

LSB based image steganography techniques renovation

LSB based image steganography techniques renovation

... LSB based image steganography technique utilizing random least significant bit selection to embedding secret information within the cover ...methods based on random selection bits of random pixels used in ...

5

Review on Priority based Congestion Control Techniques for Wireless Sensor Network

Review on Priority based Congestion Control Techniques for Wireless Sensor Network

... Sun et al.[10] proposed an algorithm which substantiates prioritization according to the degree of congestion state, and after that adaptively decides its probability of accessing channel in order to rapidly ease the ...

8

A Study on Hierarchical Cluster based Routing Techniques in Wireless Sensor Network

A Study on Hierarchical Cluster based Routing Techniques in Wireless Sensor Network

... sensor network (WSN) as the nodes are battery ...improving network life time are the performance measurements in designing any wireless sensor ...location based routing ...cluster based ...

10

Data Mining based on Hashing Technique

Data Mining based on Hashing Technique

... techniques such as decision tree method. [5,6] More recently, Wenmin Li et al critiqued some weakness of Liu’s approach as follows: (1) simply selection a rule with a maximal user-defined measure may affect the ...

5

Artificial immune system based on real valued negative selection algorithms for anomaly detection

Artificial immune system based on real valued negative selection algorithms for anomaly detection

... This research focuses on the use of two kinds of Real-Valued Negative Selection Algorithms, namely the RNSA and V-Detector. For benchmarked purpose, two popularly known classification algorithms; Support Vector Machine ...

43

Survey on Credit Card Fraud Detection Methods

Survey on Credit Card Fraud Detection Methods

... matching techniques are not often sufficient to detect those frauds ...modern techniques based on Artificial Intelligence, Data mining, Neural Network, Bayesian Network, Fuzzy logic, ...

6

A Survey on Malware and Malware Detection Systems

A Survey on Malware and Malware Detection Systems

... of conformity with the original system, efficiency and full control of system resources. Virtual machine-based malware detection systems are constructed on the basis of the mentioned concept. There exist three ...

7

Computer Techniques Solution for Cellular Network Challenges

Computer Techniques Solution for Cellular Network Challenges

... consumption, network efficient usage and fault ...cell network, Carrier aggregation can make use of spectrum very efficiently by aggregating multiple carrier with the help of Orthogonal Division Multiple ...

8

COMPARATIVE STUDY ON BOTNET DETECTION

COMPARATIVE STUDY ON BOTNET DETECTION

... detection techniques into four classes: signature-based, anomaly-based, DNS-based, and ...detection techniques in each class and provides a brief comparison of botnet detection ...

7

Applying classification techniques for network intrusion detection

Applying classification techniques for network intrusion detection

... of network technologies. The important role of network security is to protect the data from any intruder as these attacks become intrusions form threats for ...of network data need to be mined in ...

5

Integrated link level and circuit level simulation of mobile communication systems

Integrated link level and circuit level simulation of mobile communication systems

... Network level CAAD tools are based on computer aided analytic techniques, sim-.. ulation, or emulation.[r] ...

144

Show all 10000 documents...

Related subjects