Showing 201 - 220 results of 544 for search '"System resource"', query time: 0.29s Refine Results
  1. 201

    A feature selection algorithm for anomaly detection in grid environment using k-fold cross validation technique by Dahliyusmanto, Dahliyusmanto, Herawan, Tutut, Syefrida Yulina, Syefrida Yulina, Abdullah, Abdul Hanan

    Published 2017
    “…An Intrusion Detection System (IDS) seeks to identify unauthorized access to computer systems’ resources and data. The spreading of a data set size, in number of records as well as of attributes, as trigger the development of a number of big data platforms as well as parallel data analysis algorithms. …”
    Conference or Workshop Item
  2. 202
  3. 203
  4. 204
  5. 205

    Adaptive cell selection algorithm for balancing cell loads in 5G heterogeneous networks by Emre Gures, Ibraheem Shayea, Muntasir Sheikh, Mustafa Ergen, Ayman A. El-Saleh

    Published 2023-06-01
    “…Some cells have excessive user presence where the competition for system resources is high, while other cells have low user presence where system resources are not fully utilised. …”
    Get full text
    Article
  6. 206

    Shots segmentation-based optimized dual-stream framework for robust human activity recognition in surveillance video by Altaf Hussain, Samee Ullah Khan, Noman Khan, Waseem Ullah, Ahmed Alkhayyat, Meshal Alharbi, Sung Wook Baik

    Published 2024-03-01
    “…First, a shots segmentation module is introduced in the proposed framework to efficiently utilize the surveillance system resources by enhancing the lowlight video stream and then it detects salient video frames that consist of human. …”
    Get full text
    Article
  7. 207
  8. 208

    Strategic vector of economic dynamics of an industrial region by Olga Aleksandrovna Romanova

    Published 2014-03-01
    “…«A regional institutional contour of new industrialization,» a new concept is introduced. System resources of its realization possible on the basis of innovative components are defined. …”
    Get full text
    Article
  9. 209

    Optimal Search Strategy of Low-Altitude Target for Airborne Phased Array Radar Using Digital Elevation Model by Jiawei Luo, Yulin Huang, Yongchao Zhang, Deqing Mao, Wei Yang, Yin Zhang, Jianyu Yang

    Published 2022-01-01
    “…The search for low-altitude targets becomes a more challenging task for airborne phased array radar, due to the limited system resources and serious ground clutter. In this article, an optimal search strategy using the digital elevation model (DEM) is proposed to allow for a fast and high-probability searches for low-altitude targets. …”
    Get full text
    Article
  10. 210

    Robust adaptive event‐triggered ILC scheme design for discrete‐time non‐repetitive nonlinear systems by Sheng Chai, Miao Yu, Kai Zhao

    Published 2024-01-01
    “…The designed robust adaptive ET‐ILC algorithm not only guarantees perfect learning convergence in the iteration domain but also contributes to saving the system resources. The effectiveness of the presented method is demonstrated by virtue of the rigorous theoretical analysis and the illustrative simulation examples.…”
    Get full text
    Article
  11. 211

    Research on Fault-Tolerant Flight Control Computer for High Altitude Long Endurance Unmanned Air Vehicle

    Published 2018-08-01
    “…The experimental results show that the system meets the UAV's demand of high reliability, low cost and good expansibility, maximize the utilization of system resources and effectively improve the fault tolerant capability of airborne computer and the reliability of sensor subsystem. …”
    Get full text
    Article
  12. 212

    Output from Statistical Predictive Models as Input to eLearning Dashboards by Marlene A. Smith

    Published 2015-06-01
    “…The article’s brief introduction to statistical predictive models sets the stage for a description of the messaging system. Resources and methods needed to develop and implement the system are discussed.…”
    Get full text
    Article
  13. 213

    Autoscaling Pods on an On-Premise Kubernetes Infrastructure QoS-Aware by Lluis Mas Ruiz, Pere Pinol Pueyo, Jordi Mateo-Fornes, Jordi Vilaplana Mayoral, Francesc Solsona Tehas

    Published 2022-01-01
    “…The main contribution of this proposal is its dynamic autoscaling capabilities to adjust system resources to the current workload while improving QoS.…”
    Get full text
    Article
  14. 214

    Innovative approaches to biologic development on the trail of CT-P13: biosimilars, value-added medicines, and biobetters by HoUng Kim, Rieke Alten, Fraser Cummings, Silvio Danese, Geert D’Haens, Paul Emery, Subrata Ghosh, Cyrielle Gilletta de Saint Joseph, JongHyuk Lee, James O. Lindsay, Elena Nikiphorou, Ben Parker, Stefan Schreiber, Steven Simoens, Rene Westhovens, Ji Hoon Jeong, Laurent Peyrin-Biroulet

    Published 2021-01-01
    “…Relative to CT-P13 IV, CT-P13 SC offers clinical benefits in terms of pharmacokinetics, with comparable efficacy, safety, and immunogenicity, as well as increased convenience for patients and reduced demands on healthcare system resources. As was once the case for biosimilars, nomenclature and regulatory pathways for innovative biologics require clarification to support their uptake and ultimately benefit patients.…”
    Get full text
    Article
  15. 215

    Parrondo's paradox in network communication: A routing strategy by Ankit Mishra, Tao Wen, Kang Hao Cheong

    Published 2024-02-01
    “…The throughput and latency bottleneck in accessing system resources is prevalent in all communication systems. …”
    Get full text
    Article
  16. 216

    Lightweight Cryptography for the Encryption of Data Communication of IoT Devices by Ivan Sokol, Peter Hubinský, Ľuboš Chovanec

    Published 2021-10-01
    “…In this paper, we present a method of reducing the volume of data transmission between a server and an IoT device, focusing on the bandwidth, transmission security, and system resources of the IoT device. The required reduction is achieved by data compression and replacing the SSL/TLS cryptographic protocol with lightweight cryptography based on the Vernam cipher principle. …”
    Get full text
    Article
  17. 217

    Parrondo's paradox in network communication: a routing strategy by Mishra, Ankit, Wen, Tao, Cheong, Kang Hao

    Published 2024
    “…The throughput and latency bottleneck in accessing system resources is prevalent in all communication systems. …”
    Get full text
    Journal Article
  18. 218

    Matching fingerface based on area under the highest peaks curve by Elmadani, Ahmed Baba, Ramli, Abdul Rahman

    Published 2010
    “…Biometric is one of the ways, by mean of using human characteristics in accessing system resources. Fingerprint and face can be used to secure systems, because fingerprint is a unique, un-repeatable. …”
    Get full text
    Conference or Workshop Item
  19. 219

    A data analysis for intrusion detection using principal component by Abdullah, Abdul Hanan, Dahlan, Dahliyusmanto

    Published 2004
    “…PCA is then employed to reduce the high dimensional data vectors and thus, detection is handled in a low dimensional space with high efficiency and low use of system resources. Our experiments with the KDD Cup 99 dataset, although not yet completed, have shown that this approach is promising in terms of detection accuracy. …”
    Conference or Workshop Item
  20. 220

    A methodology to detect intrusion using system call based on discriminant analysis by Abdullah, Abdul Hanan, Dahlan, Dahliyusmanto

    Published 2003
    “…An intrusion detection system seeks to identify unauthorized access to computer systems' resources and data. Many methods have been proposed to detect intrusion; for example, the pattern matching method to finding intrusion by matching sample data to know intrusive patterns and the statistical approach to detect intrusion from normal activities at the user level or system level. …”
    Conference or Workshop Item