Search Results - (( basic generating leads algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- basic generating »
- java implication »
- implication tree »
- leads algorithm »
- tree algorithm »
-
1
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and non-self discrimination in intrusion detection system (IDS).In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection.Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. …”
Get full text
Get full text
Get full text
Article -
2
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…This algorithm solution generated the dataset based coordinates areas to analyze the techniques. …”
Get full text
Get full text
Conference or Workshop Item -
3
Deterministic Automatic Test Pattern Generation for Built-In Self Test System
Published 2006“…To illustrate that, the DATPG algorithm for digital combinational circuit using VHDL language is designed to generate the test patterns. …”
Get full text
Get full text
Thesis -
4
Instance matching framework for heterogeneous semantic web content over linked data environment
Published 2021“…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
Get full text
Get full text
Thesis -
5
Fingerprint reconstruction based on improved directional image
Published 2005“…In the conventional approach, for instance, a low quality image will generate many artificial minutiaes which lead to errors in fingerprint matching. …”
Get full text
Get full text
Thesis -
6
Optimal placement and sizing of distributed generators for voltage-dependent load model in radial distribution system
Published 2017“…The proposed study has been applied to the IEEE 33 radial distribution system with basic particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
7
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
8
Face Detection System / Chan Beh Teng
Published 2004“…To a layman, it may appear trivial, but to actually implement the necessary steps leading to successful execution of this in n algorithm is difficult and still an unsolved problem in computer vision.The proposed Face Detection System is an application that automates the detection of frontal human faces(s) in a given image. …”
Get full text
Get full text
Thesis -
9
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…There is potential knowledge inherent in vast amounts of untapped and possibly valuable data generated by healthcare providers. Clinicians rely in their knowledge and experience and the basic diagnostic procedure to determine the likely symptom of a disease. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
User-guided Database Schema Generation For Naive Database Developers
Published 2014“…At the end of research, researcher are expected to the generate algorithms and initial prototype for the formulated method to provide a user-friendly platform for the developer or user to reduce the above issue. …”
Get full text
Get full text
Final Year Project -
11
Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman
Published 2013“…The developed technique was tested on the 10 generating units test system then up to 20 generating units in a 24-hours scheduling period and the results was compared with the basic EP, Evolutionary Programming with Priority Listing (EP-PL) and Multi-agent Evolutionary Programming (MAEP) optimisation techniques. …”
Get full text
Get full text
Thesis -
12
Multi-dimensional optimization of In0.53Ga0.47As thermophotovoltaic cell using real coded genetic algorithm
Published 2023“…The optimization of thermophotovoltaic (TPV) cell efficiency is essential since it leads to a significant increase in the output power. …”
Article -
13
Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing
Published 2020“…One of the important factor is related to oscillator itself which generates the carrier signals and causes Inter Channel Interference Noise (ICI). …”
Get full text
Get full text
Thesis -
14
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis
