Search Results - (( based detection method algorithm ) OR ( using optimization modified algorithm ))
Search alternatives:
- optimization modified »
- method algorithm »
- based detection »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
3
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
4
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
5
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
6
SINR improvement using Firefly Algorithm (FA) for Linear Constrained Minimum Variance (LCMV) beamforming technique
Published 2023Conference Paper -
7
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
Get full text
Get full text
Thesis -
8
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
9
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
10
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
11
A novel islanding detection technique using modified Slantlet transform in multi-distributed generation
Published 2019“…A Harmony Search Algorithm (HSA) is used to optimally specify suitable scales of Slantlet transform and Slantlet decomposition levels for accurate islanding classification. …”
Get full text
Get full text
Get full text
Article -
12
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis -
13
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
14
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…An improved method that is based of the combination of Gardner transformation, optimal compensation deconvolution, and signal modelling techniques is suggested in this paper. …”
Get full text
Get full text
Get full text
Article -
15
Power System State Estimation In Large-Scale Networks
Published 2010“…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
16
A Subspace Approach for Extracting Signals Highly Corrupted by Colored Noise
Published 2010“…The simulation results produced by the post-modified SSA2 algorithm, show a higher degree of consistencies in detecting the VEP's P100, P200, and P300 peaks, in comparisons to the pre-modified SSA1 method. …”
Get full text
Get full text
Get full text
Citation Index Journal -
17
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
Get full text
Get full text
Get full text
Thesis -
18
Furrow and crypt detection using modified ant colony optimization for iris recognition / Zaheera Zainal Abidin
Published 2016“…As a solution, to improve the accuracy performance, this research proposes a new approach called as Modified Ant Colony Optimization that uses ant colony algorithm which search for crypts and radial furrow. …”
Get full text
Get full text
Thesis -
19
Furrow and crypt detection using Modified Ant Colony Optimization for iris recognition / Zaheera Zainal Abidin
Published 2016“…As a solution, to improve the accuracy performance, this research proposes a new approach called as Modified Ant Colony Optimization that uses ant colony algorithm which search for crypts and radial furrow. …”
Get full text
Get full text
Book Section -
20
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In phase four, we calculate the CSP trust value to boost security. Based on CSP behavior, we introduced the Multi Behavior Analysis-based Nomadic People Optimizer method. …”
Get full text
Get full text
Get full text
Article
