Search Results - (( java implementation bees algorithm ) OR ( using code ((tree algorithm) OR (based algorithm)) ))
Search alternatives:
- java implementation »
- implementation bees »
- bees algorithm »
- tree algorithm »
- using code »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2008“…The simulation was developed using SIMULINK and MATLAB. WaveletDCT based intra-frame coder was simulated by employing two different approaches. …”
Get full text
Get full text
Final Year Project -
3
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…Regarding the IME of H.264/AVC, we introduce two low cost bit-serial architectures, which are based on full search (FS) algorithm due to its regularity and coding performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Optimal generator matrix G
Published 2013“…Maximising the minimum determinant is equivalent to obtaining optimal generator matrix G. Instead of using state diagrams, optimal generator matrix G discussed in this paper is obtained using an improved algorithm which is based on Lisya tree structure. …”
Get full text
Get full text
Article -
6
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…This study proposed a modified standalone Machine Learning-based Adaptive Protection Scheme (ML-APS) relay' fault classifier model using novel useful hidden Knowledge Discovery from historical fault events Dataset (KDD) from healthy and faulty lines. …”
Get full text
Get full text
Thesis -
7
Analysis & design low power multiplier using TSMC 0.18µm CMOS technology
Published 2008“…Low power multipliers are developed through minimizing switching activities of partial product using the radix 4 booth algorithm. Before computation for two input data, the one with a smaller effective dynamic range is processed to generate booth codes, thereby increasing the probability that the partial products become zero. …”
Get full text
Learning Object -
8
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…, and that name is chosen because it is like Unix but differs from Unix because it is free and contains no Unix code. Those algorithms were implemented using 300 randomly generated problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…However, static analysis requires a minimum number of features to efficiently classify malware. Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
Get full text
Get full text
Article -
15
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…Different machine learning classifiers were tested based on the significant features, namely the Artificial Neural Network, Decision Tree, Random Forest, Naive Bayes Support Vector Machine, and k-Nearest Neighbors. …”
Get full text
Get full text
Thesis -
16
Morphology, molecular characterization and habitat preference of harmful Benthic dinoflagellate gambierdiscus (Dinophyceae) in Malaysia / Nurin Izzati Mustapa
Published 2020“…Morphological character states were coded and mapped onto the molecular phylogenetic tree (MP tree) to investigate the character state evolution of Gambierdiscus species. …”
Get full text
Get full text
Get full text
Thesis -
17
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…However, static analysis requires a minimal number of features to classify malware efficiently. Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
19
Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac)
Published 2014“…In this research, a new DEM algorithm is proposed on Current-Steering DACs with Partial Binary Tree Network (PBTN) algorithm to overcome glitches transitions with low complexity. …”
Get full text
Get full text
Thesis -
20
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
Published 2017“…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
Get full text
Get full text
Get full text
Article
