Search Results - (( user prevention mechanism algorithm ) OR ( based optimization isotherm algorithm ))*
Search alternatives:
- optimization isotherm »
- prevention mechanism »
- mechanism algorithm »
- user prevention »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
2
Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz
Published 2024“…The system continuously monitors the load on the system and uses advanced algorithms detect and prevent overloads. In the event of an impending overload, the system takes appropriate precautions to reduce the danger, such as automatically shedding non-critical loads or warning the user to act. …”
Get full text
Get full text
Student Project -
3
A gauss-newton approach for nonlinear optimal control problem with model-reality differences
Published 2017“…Here, the linear model-based optimal control model is considered, so as the optimal control law is constructed. …”
Get full text
Get full text
Get full text
Article -
4
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
Get full text
Get full text
Article -
5
Adaptive and optimized radio resource allocation algorithms for OFDMA based networks
Published 2015“…Also, users with better channels may continuously enjoy highest amount of radio resources, starving others with poorer channels or preventing new users from entering the network. …”
Get full text
Get full text
Thesis -
6
-
7
Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Production and characterization of biochar derived from oil palm wastes, and optimization for zinc adsorption
Published 2015“…The incremental back propagation algorithm demonstrated the best results and which has been used as learning algorithm for ANN in combination with Genetic Algorithm in the optimization. …”
Get full text
Get full text
Thesis -
10
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
Published 2011“…The experiments were used to determine reliability of the simulation tool, analyze behavior of the proposed models and determine their capabilities to prevent wireless DoS and replay attacks, determine detection accuracy of the proposed models, compare effectiveness of the proposed models, verify lifetime overhead and security cost of the proposed models, and evaluate performance of the replay-preventing mechanism. …”
Get full text
Get full text
Thesis -
11
Advance video analysis system and its applications
Published 2010Get full text
Get full text
Get full text
Article -
12
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…General rates given to the mechanism by two groups of users were 82 and 85 percent with a + 3.66 percent of uncertainty that was issued a high verification value. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Modeling of Cu(II) adsorption from an aqueous solution using an Artificial Neural Network (ANN)
Published 2020“…The Fletcher-Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
Get full text
Get full text
Article -
16
-
17
Modelling and simulation of hollow profile aluminium extruded product
Published 2015“…This process is an isothermal process with an extrusion ratio of 3.3. Subsequently, the optimized algorithm for these extrusion parameters was suggested based on the simulation results. …”
Get full text
Get full text
Get full text
Article -
18
Modeling of cu(ii) adsorption from an aqueous solution using an artificial neural network (ann)
Published 2020“…The Fletcher–Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…Second-order injections are also difficult to prevent as the point of injection differs from the point of attack, and therefore more care should be taken to detect and prevent them. …”
Get full text
Get full text
Thesis
