Search Results - (( using vector based algorithm ) OR ( using communication using algorithm ))

Refine Results
  1. 1

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…The training phase of the machine learning algorithm used proposed real-time training datasets benchmarked with two training datasets from CICIDS and NSL-KDD. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…Nowadays, the online platform is primarily used to communicate and connect with people. It controlled many lives based on many aspects. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The methodology is to use the maximize margin of SVM algorithm to alert for the presence of attack, and the proposed flexible packet filtering, which is a combination of both static and dynamic packet filtering was the method that has been followed to filter network traffics based on anomaly behavior. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A distributed particle filtering approach for multiple acoustic source tracking using an acoustic vector sensor network by Zhong, X., Mohammadi, A., Premkumar, A.B., Asif, A.

    Published 2015
    “…Different centralized approaches such as least-squares (LS) and particle filtering (PF) algorithms have been developed to localize an acoustic source by using a distributed acoustic vector sensor (AVS) array. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…Finally, the effectiveness of the algorithm is evaluated based on the accuracy performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…Speech is a natural, convenient and rapid means of human communication. The abil ity to respond to spoken language is of special importance in computer application wherein the user cannot use his/her limbs in a proper way, and may be useful in office automation systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…In this thesis, a new quaternion gradient based adaptive algorithm for FIR adaptive filter is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm by Al-Mayouf, Y.R.B., Abdullah, N.F., Ismail, M., Al-Qaraawi, S.M., Mahdi, O.A., Khan, S.

    Published 2016
    “…This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). …”
    Get full text
    Get full text
    Article
  11. 11

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…The OMNET++ simulation program is used to justify the proposed algorithms. This is done based on the specific parameters such as (number of malicious nodes, number of normal nodes, and maximum speed). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Analysing machine learning models to detect disaster events using social media by Faris Azni Azlan, Mr.

    Published 2023
    “…The results are gauged using four statistics-based metrics and a time constraint. …”
    text::Thesis
  13. 13

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…These output data are analysed to present the optimal prediction output of service restoration using Cuckoo Search Spring – Least Square Support Vector Machine (CSS-LSSVM). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems by Uwaechia, Anthony Ngozichukwuka

    Published 2018
    “…By using the restricted isometry property, the theoretical analysis of both CoFA and SdMP algorithms and the sufficient conditions for realizing an improved reconstruction performance were presented. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments by AL-Obaidi, A.S., Jubair, M.A., Aziz, I.A., Ahmad, M.R., Mostafa, S.A., Mahdin, H., AL-Tickriti, A.T., Hassan, M.H.

    Published 2022
    “…In addition, a clustering algorithm that defines mobility vector and uses Cauchy-based density for enabling adding vehicles to their respective clusters. …”
    Get full text
    Get full text
    Article
  20. 20

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…The registration contract is performed by a certificate authority, and the key is generated using the Enhanced Elliptic Curve Digital Signature (EECDS) algorithm which improves the secure and private communication between the users, IoT devices, and edge-gateway. …”
    Article