Search Results - _ distribution ((function algorithm) OR (detection algorithm))

Refine Results
  1. 1
  2. 2

    A novel scheme for performing wireless distributed computing with strip spectral correlation algorithm by Alfaqawi, Mohammed, Chebil, Jalel, Habaebi, Mohamed Hadi, Ramli, Nordin, Mohamad, Hafizal

    Published 2013
    “…To the best of our knowledge, this paper can be considered as the first research for applying wireless distributed computing (WDC) with spectrum sensing which introduces a novel technique to reduce the complexity of one of the practical methods used in cyclostationary feature detection i.e. the strip spectral correlation algorithm (SSCA) by performing WDC. …”
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  8. 8

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  10. 10

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…Another part of this work focuses on enhancing the stability of the power system using distributed generator (DG). The proposed solution is based on the optimization method developed from a combination of the Artificial Bee Colony and Hill Climbing algorithms (ABC-HC) to give the optimal placement and sizing of DG units to be deployed in the system. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Fusion of linear and nonlinear functional model for cadastral network adjustment / Nazurah Syahzanani Amiruddin by Amiruddin, Nazurah Syahzanani

    Published 2024
    “…Due to the significant discrepancy in functional models, this study begins with the identification of an algorithm to harmonize the linear (GNSS vectors) and non-linear (traverse) models. …”
    Get full text
    Get full text
    Student Project
  15. 15

    An improved bat algorithm with artificial neural networks for classification problems by Rehman Gillani, Syed Muhammad Zubair

    Published 2016
    “…The proposed BAGD, SABa, and GBa are tested on several benchmark functions and improvements in convergence to global optima were detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  17. 17

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…The proposed solution introduces and integrates ordering constraints along with a submodular energy minimisation function to/with the GC algorithm to enhance performance. …”
    Get full text
    Get full text
    Article
  18. 18

    Customized fault management system for low distribution automation system by Ahmed, Musse Mohamud, Soo, W. L.

    Published 2008
    “…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. The laboratory results are compared with the simulation results to make the final conclusion of the algorithm function properly.…”
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique by Mohd Mawardi, Saari, Mohd Herwan, Sulaiman, Kiwa, Toshihiko

    Published 2023
    “…The combination of the high-Tc SQUID magnetometer and the PSO-based reconstruction technique offers a powerful approach for characterizing the MNP core size distribution, and further improvements can be expected from the recent state-of-the-art optimization algorithm to optimize further the computation time and the best objective function value.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. This paper applied Hilbert-Huang Transform (HHT) as a method to analyse the pressure transient signal. …”
    Get full text
    Get full text
    Article