Search Results - _ distribution ((function algorithm) OR (detection algorithm))
Search alternatives:
-
1
Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks
Published 2017“…The coalitions formed using the algorithm are stable and do not deviate from the final matching. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
A novel scheme for performing wireless distributed computing with strip spectral correlation algorithm
Published 2013“…To the best of our knowledge, this paper can be considered as the first research for applying wireless distributed computing (WDC) with spectrum sensing which introduces a novel technique to reduce the complexity of one of the practical methods used in cyclostationary feature detection i.e. the strip spectral correlation algorithm (SSCA) by performing WDC. …”
Get full text
Get full text
Proceeding Paper -
3
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
4
-
5
Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory
Published 2017“…The coalitions formed using the algorithm are stable and do not deviate from the final matching. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. …”
Get full text
Get full text
Get full text
Thesis -
7
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article -
8
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
9
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
10
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
11
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices
Published 2021“…Another part of this work focuses on enhancing the stability of the power system using distributed generator (DG). The proposed solution is based on the optimization method developed from a combination of the Artificial Bee Colony and Hill Climbing algorithms (ABC-HC) to give the optimal placement and sizing of DG units to be deployed in the system. …”
Get full text
Get full text
Thesis -
13
-
14
Fusion of linear and nonlinear functional model for cadastral network adjustment / Nazurah Syahzanani Amiruddin
Published 2024“…Due to the significant discrepancy in functional models, this study begins with the identification of an algorithm to harmonize the linear (GNSS vectors) and non-linear (traverse) models. …”
Get full text
Get full text
Student Project -
15
An improved bat algorithm with artificial neural networks for classification problems
Published 2016“…The proposed BAGD, SABa, and GBa are tested on several benchmark functions and improvements in convergence to global optima were detected. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
17
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…The proposed solution introduces and integrates ordering constraints along with a submodular energy minimisation function to/with the GC algorithm to enhance performance. …”
Get full text
Get full text
Article -
18
Customized fault management system for low distribution automation system
Published 2008“…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. The laboratory results are compared with the simulation results to make the final conclusion of the algorithm function properly.…”
Get full text
Get full text
Proceeding Paper -
19
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…The combination of the high-Tc SQUID magnetometer and the PSO-based reconstruction technique offers a powerful approach for characterizing the MNP core size distribution, and further improvements can be expected from the recent state-of-the-art optimization algorithm to optimize further the computation time and the best objective function value.…”
Get full text
Get full text
Get full text
Article -
20
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. This paper applied Hilbert-Huang Transform (HHT) as a method to analyse the pressure transient signal. …”
Get full text
Get full text
Article
