Search Results - (( mobile relation based algorithm ) OR ( _ identification system algorithm ))*
Search alternatives:
- identification system »
- _ identification »
- system algorithm »
- mobile relation »
- relation based »
-
1
Identification Of Flow Blockage Levels In Centrifugal Pump By Machine Learning
Published 2021“…SVM model with cubic kernel is preferable as the training time taken is relatively lower than Ensemble Bagged Tree due to the ensemble algorithms are more complex. …”
Get full text
Get full text
Monograph -
2
Bayesian signaling game based efficient security model for MANETs
Published 2020“…The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Content-based indexing of low resolution documents
Published 2016“…A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024“…A case study was carried out to reverse engineering the mobile botnet codes. Based on the findings, this mobile botnet has successfully posed itself as a fake anti-virus and has the capability to steal important data such as username and password from the Android-based devices. …”
Proceedings Paper -
5
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
6
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
Published 2015“…In this paper, we propose an adaptive, coordinated and non-blocking checkpointing algorithm to provide fault tolerance in cluster based MANET, where only minimum number of mobile hosts in the cluster should take checkpoints. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
8
Multivariable system identification for dynamic discrete-time nonlinear system using genetic algorithm
Published 2002“…The development of a multivariable system identification model for dynamic discrete-time nonlinear system using genetic algorithm was discussed and analysed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Data mining in mobile ECG based biometric identification
Published 2014“…Therefore, these outcomes support the usability of ECG based biometric identification in a mobile environment.…”
Get full text
Get full text
Get full text
Article -
10
Multivariable system identification for dynamic discrete-time nonlinear system using genetic algorithm
Published 2002“…The development of a multivariable system identification model for dynamic discrete-time nonlinear system using genetic algorithm was discussed and analysed. …”
Get full text
Get full text
Conference or Workshop Item -
11
Adaptive Linear System Identification over Simulated Wireless Environment
Published 2009“…The thesis investigates the possibility of performing system identification over wireless network for both on-line and off-line system identification approaches. …”
Get full text
Get full text
Thesis -
12
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
13
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…The motions of Pioneer 3TM mobile robot were simulated to show the developed algorithm performance. …”
Get full text
Get full text
Thesis -
14
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…To overcome the issues related to the broadcasting method, several routing algorithms have been proposed over the Ad hoc on demand Distance Vactor (AODV) such as Neighbor Coverage-Based Probabilistic Rebroadcast (NCPR). …”
Get full text
Get full text
Get full text
Thesis -
15
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
Published 2017“…This thesis proposes a prediction-based scheme called Face-based Target Tracking Technique (FTTT) to minimize energy depletion and prolong the lifetime for sensor node while accurately tracking mobile objects. …”
Get full text
Get full text
Thesis -
16
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…This study deals with the use of the rule-based fuzzy system for the identification of non-linear dynamic systems. …”
Get full text
Get full text
Get full text
Thesis -
17
A comprehensive review of mobile botnet detection using genetic algorithm: A systematic review
Published 2024journal::journal article -
18
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Originality/value – This study presents a novel hybrid algorithm for system identification of an autonomous helicopter model.…”
Get full text
Get full text
Get full text
Article -
19
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Hence, it is essential to discover the alternative algorithms in order to apply the concept of subspace identification recursively. …”
Get full text
Get full text
Get full text
Article -
20
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Model structure selection is one of the important steps in a system identification process. Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
Get full text
Get full text
Get full text
Article
