Search Results - (( based optimization methods algorithm ) OR ( user detection method algorithm ))
Search alternatives:
- optimization methods »
- methods algorithm »
- method algorithm »
- user detection »
-
1
Recent Efficient Iterative Algorithms on Cognitive Radio Cooperative Spectrum Sensing to Improve Reliability and Performance
Published 2016“…In fact, all steps of genetic algorithm (GA), particle swarm optimization (PSO), and imperialistic competitive algorithm (ICA) will be well mentioned in detail and investigated on cognitive radio cooperative spectrum sensing (CRCSS) method. …”
Get full text
Get full text
Article -
2
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…This paper focuses on optimality of analytical study on the common soft fusion (SDF) CSS based on different iterative algorithms which confirm low total probability of error and high probability of detection in details. …”
Get full text
Get full text
Conference or Workshop Item -
3
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
4
SINR improvement using Firefly Algorithm (FA) for Linear Constrained Minimum Variance (LCMV) beamforming technique
Published 2023Conference Paper -
5
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…In addition, DL-based malware detection methods often entail single classifiers. …”
Get full text
Get full text
Get full text
Article -
6
Optimal resource allocation for NOMA wireless networks
Published 2022“…The major goal is to maximize the users’ maximum weighted sum rate. The suggested algorithm’s most notable feature is that it converges to the global optimal solution. …”
Get full text
Get full text
Article -
7
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
Get full text
Get full text
Thesis -
8
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…It consists of several steps that make this method as an optimal edge detector. The objective of this research is gained from understanding of the problem statement. …”
Get full text
Get full text
Thesis -
9
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
10
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Memory testing is a method that requires an algorithm capable of detecting faulty memory as comprehensively as possible to facilitate the efficient manufacture of fault free memory products. …”
Get full text
Get full text
Thesis -
11
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
12
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
13
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…Unlike other control methods applied to industrial robotic systems in the sense of giving specific trajectory to be tracked, ERD physically interacts alongside with the user. …”
Get full text
Get full text
Thesis -
17
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…Most of the existing algorithms consider the noise filtering step precedes trajectory segmentation step which mean that there is no preprocessing method to partition trajectory into set of segments and remove noise points in real time with low computational cost. …”
Get full text
Get full text
Thesis -
18
Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli
Published 2015“…However, in real working condition where some computer are serving users processes, the dynamic algorithm provides a potential alternative.…”
Get full text
Get full text
Thesis -
19
Drowsiness Detection Using Ocular Indices from EEG Signal
Published 2022“…Different machine learning classification models, including the decision tree, the support vector machine (SVM), the K-nearest neighbor (KNN) method, and the bagged and boosted tree models, were trained based on the seven selected features. …”
Get full text
Get full text
Article -
20
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…The Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for role-based access control and judge contracts. To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
Article
