Search Results - (( _ detection method algorithm ) OR ( based generation based algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2021
    “…This paper proposed the fuzzy-ID3 (FID3) algorithm, a fuzzy decision tree as the classification method in breast cancer detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The results of the proposed search-based test data generator show significant performance compared to the existing search-based test data generator.…”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents by Al-Dyani, Wafa Zubair Abdullah

    Published 2022
    “…The effectiveness of ABBA-AMCL was compared to 8 FS methods based on meta-heuristic algorithms and 6 graph-based ED methods. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In this paper, GA path-planning approach is enhanced with feasible path detection mechanism based on traversability vectors method. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. The GLS is 7.8 and 5.5 times faster than A* and LS, respectively, generating a path 1.2 and 1.5 times shorter than A* and LS. …”
    Get full text
    Thesis
  13. 13

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis by Ashraf Osman, Ibrahim, Siti Mariyam, Shamsuddin, Abdulrazak, Yahya Saleh, Ahmed, Ali, Mohd Arfian, Ismail, Shahreen, Kasim

    Published 2019
    “…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Formulation Of A Maximum Power Point Tracking (Mppt) Algorithm For Hydrokinetic Energy Harnessing by Muhammad Naqib, Mazalan

    Published 2022
    “…This thesis is about a performance analysis based on Maximum Power Point Tracking (MPPT) algorithm generated by the hydrokinetic energy. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Ultrasonic wavefield inspection has been available for a while and it is a great method for damage detection. However, the challenge lies in the complexity of the algorithm for mode isolation. …”
    Get full text
    Get full text
    Article
  19. 19

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
    Get full text
    Get full text
    Article
  20. 20

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Defining features in detecting malicious web pages is a vital condition in order to generate accurate detection result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item