Search Results - (( wave optimization methods algorithm ) OR ( data detection model algorithm ))
Search alternatives:
- optimization methods »
- wave optimization »
- methods algorithm »
- detection model »
- model algorithm »
- data detection »
-
1
Inversion Of Surface Wave Phase Velocity Using New Genetic Algorithm Technique For Geotechnical Site Investigation
Published 2011“…Therefore the use of genetic algorithm (GA) optimization technique which is one of nonlinear optimization methods is an appropriate choice to solve surface wave inversion problem having high nonlinearity and multimodality. …”
Get full text
Get full text
Thesis -
2
Optimizing the efficiency of Oscillating Water Column (OWC) wave energy converter using genetic algorithm
Published 2015“…This paper, describes a method to maximize the pneumatic system efficiency using optimization technique based on Genetic algorithm. …”
Get full text
Get full text
Article -
3
Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G
Published 2021“…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
Get full text
Get full text
Article -
4
Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G
Published 2021“…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
Get full text
Get full text
Article -
5
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
Get full text
Get full text
Article -
6
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
Get full text
Get full text
Article -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
8
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. …”
Get full text
Thesis -
9
Interferometric array planning using division algorithm for radio astronomy applications
Published 2017“…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
10
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…When comparing the accuracy of a malware detection model, it is excellent if there are numerous machine learning algorithms and more malware datasets included.…”
Get full text
Get full text
Student Project -
11
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
13
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
15
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
16
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
17
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
18
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
19
Gooseneck barnacle optimization algorithm: A novel nature inspired optimization theory and application
Published 2024“…In contrast to the previously published Barnacle Mating Optimizer (BMO) algorithm, GBO more accurately captures the unique static and dynamic mating behaviours specific to gooseneck barnacles. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
