Search Results - (( _ detection method algorithm ) OR ( based generation based algorithm ))
Search alternatives:
- method algorithm »
- based generation »
- generation based »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
2
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…This paper proposed the fuzzy-ID3 (FID3) algorithm, a fuzzy decision tree as the classification method in breast cancer detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The results of the proposed search-based test data generator show significant performance compared to the existing search-based test data generator.…”
Get full text
Get full text
Get full text
Thesis -
4
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
Get full text
Get full text
Thesis -
6
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
8
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
9
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…The effectiveness of ABBA-AMCL was compared to 8 FS methods based on meta-heuristic algorithms and 6 graph-based ED methods. …”
Get full text
Get full text
Thesis -
10
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…In this paper, GA path-planning approach is enhanced with feasible path detection mechanism based on traversability vectors method. …”
Get full text
Get full text
Get full text
Article -
11
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. The GLS is 7.8 and 5.5 times faster than A* and LS, respectively, generating a path 1.2 and 1.5 times shorter than A* and LS. …”
Get full text
Thesis -
13
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
14
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
15
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
Get full text
Get full text
Get full text
Article -
16
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Formulation Of A Maximum Power Point Tracking (Mppt) Algorithm For Hydrokinetic Energy Harnessing
Published 2022“…This thesis is about a performance analysis based on Maximum Power Point Tracking (MPPT) algorithm generated by the hydrokinetic energy. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Ultrasonic wavefield inspection has been available for a while and it is a great method for damage detection. However, the challenge lies in the complexity of the algorithm for mode isolation. …”
Get full text
Get full text
Article -
19
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
20
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Defining features in detecting malicious web pages is a vital condition in order to generate accurate detection result. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
