Search Results - a distribution ((function algorithm) OR (((detection algorithm) OR (conversion algorithm))))

Refine Results
  1. 1

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The overall software design is divided into three modules which are Image Acquisition, Image Processing and Object Detection, and Data Transmission module. The image processing algorithm includes color space conversion and motion analysis technique. …”
    Get full text
    Thesis
  2. 2

    Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2017
    “…In this paper, we propose a novel algorithm for improving spectrum sensing in cognitive radio networks by forming coalitions among cognitive radio users in a fading channel environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A novel scheme for performing wireless distributed computing with strip spectral correlation algorithm by Alfaqawi, Mohammed, Chebil, Jalel, Habaebi, Mohamed Hadi, Ramli, Nordin, Mohamad, Hafizal

    Published 2013
    “…To the best of our knowledge, this paper can be considered as the first research for applying wireless distributed computing (WDC) with spectrum sensing which introduces a novel technique to reduce the complexity of one of the practical methods used in cyclostationary feature detection i.e. the strip spectral correlation algorithm (SSCA) by performing WDC. …”
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2017
    “…Specifically, the stable marriage problem is used to formulate the interactions among the cognitive radio users as a matching game for collaborative distributed spectrum sensing under target detection probability constraint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Q-Learning improve the overall exploration strategy, but it also presented a weakness. Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  9. 9

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  11. 11

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…Another part of this work focuses on enhancing the stability of the power system using distributed generator (DG). The proposed solution is based on the optimization method developed from a combination of the Artificial Bee Colony and Hill Climbing algorithms (ABC-HC) to give the optimal placement and sizing of DG units to be deployed in the system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new approach for optimum DG placement and sizing based on voltage stability maximization and minimization of power losses by Aman, M.M., Jasmon, G.B., Bakar, A.H.A., Mokhlis, Hazlie

    Published 2013
    “…In the new proposed algorithm, a multi-objective approach is used to combine the both approaches together. …”
    Get full text
    Get full text
    Article
  16. 16

    Fusion of linear and nonlinear functional model for cadastral network adjustment / Nazurah Syahzanani Amiruddin by Amiruddin, Nazurah Syahzanani

    Published 2024
    “…Consequently, the findings have demonstrated the reliability of a hybrid algorithm as an alternative for cadastral network adjustment. …”
    Get full text
    Get full text
    Student Project
  17. 17

    An improved bat algorithm with artificial neural networks for classification problems by Rehman Gillani, Syed Muhammad Zubair

    Published 2016
    “…Metaheuristic search algorithms have been used for quite a while to optimally solve complex searching problems with ease. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…Furthermore, a trust-based secure routing algorithm is incorporated to dynamically detect misbehavior in terms of packet forwarding for energy-efficient communication among sensor nodes. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20