Search Results - (( using vector based algorithm ) OR ( using communication using algorithm ))
Search alternatives:
- using communication »
- communication using »
- using algorithm »
- vector based »
-
1
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…The training phase of the machine learning algorithm used proposed real-time training datasets benchmarked with two training datasets from CICIDS and NSL-KDD. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…Nowadays, the online platform is primarily used to communicate and connect with people. It controlled many lives based on many aspects. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The methodology is to use the maximize margin of SVM algorithm to alert for the presence of attack, and the proposed flexible packet filtering, which is a combination of both static and dynamic packet filtering was the method that has been followed to filter network traffics based on anomaly behavior. …”
Get full text
Get full text
Get full text
Thesis -
5
A distributed particle filtering approach for multiple acoustic source tracking using an acoustic vector sensor network
Published 2015“…Different centralized approaches such as least-squares (LS) and particle filtering (PF) algorithms have been developed to localize an acoustic source by using a distributed acoustic vector sensor (AVS) array. …”
Get full text
Get full text
Get full text
Article -
6
Autism Spectrum Disorder Classification Using Deep Learning
Published 2021“…Finally, the effectiveness of the algorithm is evaluated based on the accuracy performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
8
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…Speech is a natural, convenient and rapid means of human communication. The abil ity to respond to spoken language is of special importance in computer application wherein the user cannot use his/her limbs in a proper way, and may be useful in office automation systems. …”
Get full text
Get full text
Thesis -
9
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…In this thesis, a new quaternion gradient based adaptive algorithm for FIR adaptive filter is developed. …”
Get full text
Get full text
Get full text
Thesis -
10
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
Published 2016“…This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). …”
Get full text
Get full text
Article -
11
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. This is done based on the specific parameters such as (number of malicious nodes, number of normal nodes, and maximum speed). …”
Get full text
Get full text
Get full text
Thesis -
12
Analysing machine learning models to detect disaster events using social media
Published 2023“…The results are gauged using four statistics-based metrics and a time constraint. …”
text::Thesis -
13
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…These output data are analysed to present the optimal prediction output of service restoration using Cuckoo Search Spring – Least Square Support Vector Machine (CSS-LSSVM). …”
Get full text
Get full text
Thesis -
14
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
15
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…By using the restricted isometry property, the theoretical analysis of both CoFA and SdMP algorithms and the sufficient conditions for realizing an improved reconstruction performance were presented. …”
Get full text
Get full text
Thesis -
16
-
17
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments
Published 2022“…In addition, a clustering algorithm that defines mobility vector and uses Cauchy-based density for enabling adding vehicles to their respective clusters. …”
Get full text
Get full text
Article -
20
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…The registration contract is performed by a certificate authority, and the key is generated using the Enhanced Elliptic Curve Digital Signature (EECDS) algorithm which improves the secure and private communication between the users, IoT devices, and edge-gateway. …”
Article
