Search Results - (( development mitigate reporting algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Negative bias temperature instability and permittivity dependent delay mitigation in High-K metal oxide compatible cmos dielectric / Nissar Mohammad Karim by Nissar, Mohammad Karim

    Published 2015
    “…This data was found by employing experimentally obtained refractive index data into the developed algorithm.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Adaptive linear neural network approach for three-phase four-wire active power filtering under non-ideal grid and unbalanced load scenarios by Hoon Y., Radzi M.A.M., Al-Ogaili A.S.

    Published 2023
    “…Hence, in this work, a control algorithm (named as enhanced-ADALINE) which combines the strength of highly selective filter (HSF), ADALINE concept and averaging function is proposed, to manage harmonics mitigation by shunt active power filter (SAPF) under non-ideal grid and unbalanced load scenarios. …”
    Article
  8. 8

    Adaptive linear neural network approach for three-phase four-wire active power filtering under non-ideal grid and unbalanced load scenarios by Hoon, Yap, Mohd Radzi, Mohd Amran, Al-Ogaili, Ali Saadon

    Published 2019
    “…Hence, in this work, a control algorithm (named as enhanced-ADALINE) which combines the strength of highly selective filter (HSF), ADALINE concept and averaging function is proposed, to manage harmonics mitigation by shunt active power filter (SAPF) under non-ideal grid and unbalanced load scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of low-overhead soft error mitigation technique for safety critical neural networks applications by Khalid Adam, Ismail Hammad

    Published 2021
    “…To address this issue, this study developed a Selective Mitigation Technique based on the standard Triple Modular Redundancy (S-MTTM-R) to determine the model’s vulnerable parts, distinguishing Malfunction and Light-Malfunction errors. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…Decision Tree and Random Forest display superior performance compared to other algorithms with 100.00% accuracy. Furthermore, it is observed that feature selection and dimensionality reduction techniques can notably enhance classifier effectiveness while mitigating computational complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…Decision Tree and Random Forest display superior performance compared to other algorithms with 100.00% accuracy. Furthermore, it is observed that feature selection and dimensionality reduction techniques can notably enhance classifier effectiveness while mitigating computational complexity. …”
    Get full text
    Get full text
    Article
  16. 16

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Article
  17. 17

    Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das by Utpal, Kumar Das

    Published 2019
    “…In addition, a novel data preparation algorithm is also developed to prepare the solar irradiance (SI) pattern of the forecasted day for forecasting PV output power based on the online-weather-report. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Distributed Denial-of-Service Defense System by Hanasi, Lidiyawatie

    Published 2006
    “…The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. …”
    Get full text
    Get full text
    Final Year Project