Search Results - ((((section algorithm) OR (generation algorithm))) OR (detection algorithm))
Search alternatives:
-
1
An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa
Published 2020“…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Development of obstable avoidance system for 3D robot navigation
Published 2024“…The performance of the algorithm is discussed in the results and discussion section. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Automated Model Generation Approach Using MATLAB
Published 2011“…It can generate multiple models to cover a wide range of input conditions by detecting nonlinearity through variations in output error, and can achieve bumpless transfer between models and handle nonlinearity. …”
Get full text
Get full text
Get full text
Book Section -
4
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph is categorized into three sections: generation, analysis, and use of attack graph. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…The attack graph is categorized into three sections: generation, analysis, and use of attack graph. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Subspace Techniques for Brain Signal Enhancement
Published 2009“…Later, the performance of the algorithms is assessed in their abilities to detect the latencies of the P100, P200 and P300 components. …”
Get full text
Get full text
Book Section -
7
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…Active detection algorithm generates disturbances at the output by Positive feedback and Continuous feedback signal injection which is based on DQ implementation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Distribution network fault section estimation using analytical database approach
Published 2004“…This thesis describes the development or a new fault section estimation algorithm in a distribution network. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and non-self discrimination in intrusion detection system (IDS).In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection.Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. …”
Get full text
Get full text
Get full text
Article -
11
Solving time gap problems through the optimization of detecting stepping stone algorithm
Published 2004“…It is found that current algorithm of detecting stepping stone is not optimized. …”
Get full text
Get full text
Book Section -
12
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
13
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…A high-complexity test algorithm like the March MSS (18N) can guarantee the detection of all unlinked static faults in SRAM. …”
Get full text
Get full text
Get full text
Article -
14
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
Get full text
Get full text
Thesis -
16
Development of a smart edge device for fire detection
Published 2023“…The system is based on an object detection model for fire detection using the Improved YOLOv5s algorithm, which integrates BiFPN and an additional prediction layer for detecting small targets of fire. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
Get full text
Get full text
Get full text
Thesis -
18
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
Get full text
Get full text
Thesis -
19
Fault detection with optimum March test algorithm
Published 2013“…The automation hardware was designed to give the flexibility to the user to generate other new March Algorithm prior to the selected algorithm and analyzed the performance in terms of fault detection and power consumption.…”
Get full text
Get full text
Get full text
Article -
20
Development of novel distance relay scheme to prevent false tripping during power swing / Nor Zulaily Mohamad
Published 2017“…The initial work carried out in this study focuses on developing a new detection scheme that able to detect a fault that occurs during power swing. …”
Get full text
Get full text
Book Section
