Search Results - (( data detection method algorithm ) OR ( time optimization modified algorithm ))
Search alternatives:
- optimization modified »
- time optimization »
- method algorithm »
- data detection »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
3
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Results show that the proposed method is able to detect islanding conditions with 100% accuracy, 100% detection rate and 0% false alarm with detection time of less than 0.19s. …”
Get full text
Get full text
Thesis -
5
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
6
Power System State Estimation In Large-Scale Networks
Published 2010“…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
7
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
8
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
9
A Subspace Approach for Extracting Signals Highly Corrupted by Colored Noise
Published 2010“…The simulation results produced by the post-modified SSA2 algorithm, show a higher degree of consistencies in detecting the VEP's P100, P200, and P300 peaks, in comparisons to the pre-modified SSA1 method. …”
Get full text
Get full text
Get full text
Citation Index Journal -
10
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…Based on CSP behavior, we introduced the Multi Behavior Analysis-based Nomadic People Optimizer method. Every CSP’s trust value is modified based on user feedback over time. …”
Get full text
Get full text
Get full text
Article -
11
Video colorization using canny optimization technique / Irwin Kevin Mueson
Published 2016“…Colorization process will be using the technique of Canny Optimization method. This is a hybrid technique from Colorization using Optimization, which was modified and improved the algorithms by adding Canny Edge Detection to improve the colorization process on the grayscale image or frames. …”
Get full text
Get full text
Thesis -
12
Modelling of cupping suction system based on system identification method
Published 2022“…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period
Published 2023“…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Modeling of cupping suction system based on system identification method
Published 2022“…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). Moreover, there is a tool in MATLAB called System Identification Toolbox that can help to collect real measurement data samples. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem
Published 2023“…This work introduced a new Binary Whale Optimization Algorithm, which utilized a novel time-varying modified Sigmoid transfer function with a modified logarithmic decreasing time-varying update strategy to improve the balancing of exploration and exploitation in WOA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
Get full text
Get full text
Thesis -
17
An application of modified adaptive bats sonar algorithm (MABSA) on fuzzy logic controller for dc motor accuracy
Published 2021“…When compared with PSO algorithm, proposed FLC optimized by MABSA showed improvement by 12.5% in rise time and 10% in settling time. …”
Get full text
Get full text
Thesis -
18
Improved swarm intelligence algorithms with time-varying modified Sigmoid transfer function for Amphetamine-type stimulants drug classification
Published 2022“…In this article, a new time-varying modified Sigmoid transfer function with two time-varying updating schemes is proposed as the binarization method for particle swarm optimization (PSO), grey wolf optimization algorithm (GWO), whale optimization algorithm (WOA), harris hawk optimization (HHO), and manta-ray foraging optimization (MRFO). …”
Get full text
Get full text
Get full text
Article -
19
Path Optimization For Cooperative Multi-Head 3d Printing
Published 2020“…Therefore, to solve the LPOP, two algorithms are proposed, the modified AS algorithm and the modified ACS algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…A set of modified and novel optimization algorithms are proposed in this thesis to deal with different single and multi-objective OPF problems. …”
Get full text
Get full text
Thesis
