Search Results - (( java implication force algorithm ) OR ( dramatic _ detection algorithm ))
Search alternatives:
- implication force »
- java implication »
- force algorithm »
-
1
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
2
-
3
-
4
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
UAV actuator fault detection through artificial intelligent technique / Zulhilmy Sahwee ... [et al.]
Published 2018“…However, the recent, a dramatic improvement in computer speed and the development of more efficient algorithms have changed the situation considerably. …”
Get full text
Get full text
Article -
6
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
7
UAV actuator fault detection through artificial intelligent technique
Published 2023“…However, the recent, a dramatic improvement in computer speed and the development of more efficient algorithms have changed the situation considerably. …”
Article -
8
Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques
Published 2023“…Furthermore, the negative effect of financial crimes on financial institutions has grown dramatically over the years. The second contribution to this research is to develop multiple hybrid machine learning models in order to enhance the detection of fraudulent activities in the credit card fraud detection domain.…”
Get full text
Get full text
Thesis -
9
Potential issues in novel computational research: artificial immune systems
Published 2003“…Artificial immune systems (AIS) is a novel computing paradigm inspired from the human immune system (HIS). The dramatic features of HIS like distributability, uniqueness, adaptability, mobility, imperfect-detection, and anomaly-detection, have grabbed the attention of computational researchers for adopting HIS principles to design AIS that are robust, scalable, highly flexible, resilient to sub-versioning, and degrade gracefully. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Neural network based detection of voice disorders using energy spectrum and equal-loudness contours
Published 2011Get full text
Working Paper -
11
Unprecedented smart algorithm for uninterrupted SDN services during DDoS attack
Published 2021“…Moreover, recently the high frequencies of DDoS attacks have increased dramatically. In this paper, a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Image segmentation method for boundary detection of breast thermography using random walkers
Published 2013“…In breast thermography diagnostic, proper detection and segmentation of the areola area as well as detection of breast boundaries present the biggest challenge. …”
Get full text
Get full text
Thesis -
13
Early dengue diagnosis based on fuzzy logic / Shahrul Razhi Che Ros
Published 2017Get full text
Get full text
Thesis -
14
Structural crack detection using deep convolutional neural network / Raza Ali
Published 2022“…However, manual crack detection is a time-consuming and challenging task due to large areas, complex structures, and safety risks. …”
Get full text
Get full text
Get full text
Thesis -
15
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis -
16
Google the earth: what's next?
Published 2010“…Satellite imagery/data can be used for everything from ground truthing and change detection, to more sophisticated analyses, including feature extraction and natural hazard prediction. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
17
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). The results shows that the algorithm ONF-TRS has low computational cost and high compression rate as compared with the existing works. …”
Get full text
Get full text
Thesis -
18
Design and development of an autonomous underwater vehicle for underwater target navigation mission module
Published 2019“…The Target Navigation Mission Module used the Kalman Filter algorithm to estimates the state of a system during the navigation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion
Published 2017“…The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
Get full text
Get full text
Thesis
