Search Results - (evolution OR solution) ((computing techniques) OR (detection technique))

Search alternatives:

Refine Results
  1. 1

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Critical review of object detection techniques for traffic light detection in intelligent transportation systems by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad

    Published 2025
    “…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network by Ahmed, Abdulghani Ali

    Published 2019
    “…The proposed technique aims to detect Botnet zero-day attack in real time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Metric-based code smell detection technique for python software by Leeman, Samaila Ja'afaru

    Published 2018
    “…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In this work, a new islanding detection technique is proposed based on combination of Slantlet Transform and Ridgelet Probabilistic Neural Network to detect islanding conditions from other disturbance for a 250-kW PV array connected to a typical North American distribution grid and a wind farm power generation system. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Lattice Sphere Detection Techniques In Block Data Transmission And Multiuser Wireless Systems by Albreem, Mahmoud A. M.

    Published 2013
    “…Owing to its high computational load, lattice sphere detection (LSD) technique and its variants had been proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Stepping-stone detection technique for recognizing legitimate and attack connections by Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam

    Published 2015
    “…However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique by Ali Mohamed, Nachaat Abdelatif

    Published 2022
    “…The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.…”
    Get full text
    Get full text
    Thesis
  11. 11

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment by Wisam H A.Muragaa

    Published 2024
    “…DDoS detection solutions based on Machine learning techniques and entropy techniques in SDN suffer from either increase the CPU usage or increase false alarms. …”
    thesis::doctoral thesis
  13. 13

    Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq by Bilal , Ishfaq

    Published 2016
    “…This proposed technique is a lightweight solution which consumes less controller resources in detecting and mitigating the DoS attack. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Fighting video analysis employing computer vision technique by Foo, Wen Shun

    Published 2022
    “…This project is about analysing and classifying the fighting video from the UCF_Crimes dataset to explore solutions to detect fighting events employing computer vision technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    A wireless precoding technique for millimetre-wave MIMO system based on SIC-MMSE by Boby, Rounakul Islam, Abdullah, Khaizuran, Jusoh, Ahmad Zamani, Parveen, Nagma, Asnawi, Ani Liza

    Published 2019
    “…To improve the conventional mm-wave MIMO nodal detection and coordination performance, the system processes data using symbolized error vector technique for linearization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Performance analysis of spectrum sensing methods: a numerical approach by Hasan, Mohammad Kamrul, Ismail, Ahmad Fadzil, Hassan Abdalla Hashim, Aisha, Mohd. Ramli, Huda Adibah, Islam, Shayla, Hashim, Wahidah

    Published 2014
    “…In addition, in the attempt to increase the efficiency of spectrum resources, this paper proposes a sensing technique which is imposed over advanced energy detection technique to detect the idle spectrums. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Malicious website detection by Ong, Vienna Lee

    Published 2019
    “…With previous existing methods in consideration, the method to use for this project is by using heuristic-based detection with machine learning technique and the feature that will be used together with the technique is URL based feature. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…There has been noteworthy research on image based steganography techniques to overcome the various challenges i.e. lower embedding capacity, imperceptibility, embedding efficiency and robustness against steganalysis detection attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…Therefore, the microwave imaging technique is proposed to detect the wood defects. In this thesis, Forward-Backward Time-Stepping (FBTS) method is applied to microwave imaging wood defect detection application. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Antipatterns detection approaches in object-oriented design: a literature review by Din, Jamilah, Al-Badareen, Anas Bassam, Jusoh, Yusmadi Yah

    Published 2012
    “…Design pattern detection is a useful technique for gaining knowledge on the design issues of existing systems and improves the system's comprehension, which consequently enhance the software maintainability and evolution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item