Search Results - (( java pattern classification algorithm ) OR ( using generating detection algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…Passive detection algorithm uses several types of loads such as resistive, capacitive and inductive connected in parallel and compares the performance of the algorithm in each case.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Fault detection with optimum March test algorithm by Zakaria, Nor Azura, Wan Hassan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Xiao, Qing Wen

    Published 2013
    “…The automation hardware was designed to give the flexibility to the user to generate other new March Algorithm prior to the selected algorithm and analyzed the performance in terms of fault detection and power consumption.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…A model-driven approach was used for generating abstract test cases from the feasible paths. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Defining features in detecting malicious web pages is a vital condition in order to generate accurate detection result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…GA functions on a number of possible solutions using the principle of survival of the fittest with the aim to generate better approximations to solve a particular problem GA is facing. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion by Ali, Mohammed A. H., Musa, Mailah, Jabbar, Waheb A., Moiduddin, Khaja, Ameen, Wadea, Alkhalefah, Hisham

    Published 2020
    “…A real-time roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion in a road environment is presented in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Real time power quality event detection using continuous wavelet transform by Tan R.H.G., Ramachandaramurthy V.K.

    Published 2023
    “…A test bench setup with voltage sag generator is used to test the performance of the proposed algorithm. …”
    Conference paper