Search Results - (( security classification technique algorithm ) OR ( basic optimization path algorithm ))
Search alternatives:
- classification technique »
- security classification »
- basic optimization »
- optimization path »
- path algorithm »
-
1
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The comparison between euler's path and Bipartite graph Algorithm [14] will be made at the end this of this report to see which one give optimal chaining .…”
Get full text
Get full text
Thesis -
2
Particle swarm optimization (PSO) for CNC route problem
Published 2002“…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2021“…To solve the redundancy resolution, meta-heuristic optimizations, namely Genetic Algorithm (GA) and Whale Optimization Algorithm (WOA), are applied to search optimal trajectories inside local orientation angle boundaries. …”
Get full text
Get full text
Get full text
Article -
4
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
5
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…It makes use of three basic operations in order to optimize this problem. …”
Get full text
Get full text
Thesis -
6
Path planning algorithm for a car like robot based on MILP method
Published 2013“…This project is presents an algorithm for path planning optimal routes mobile robot “like a car” to a target in unknown environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…This study shows that Basic Theta* is able to produce the true shortest path compared to A* which produced slightly longer path. …”
Get full text
Get full text
Thesis -
8
Genetic algorithm optimization for coefficient of FFT processor
Published 2010Get full text
Get full text
Get full text
Article -
9
K-NN classifier for data confidentiality in cloud computing
Published 2014“…In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. …”
Get full text
Get full text
Conference or Workshop Item -
10
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…A multi layer feed forward ANN with Back Propagation Network algorithm is proposed in determining the steady state stability classifications. …”
Get full text
Get full text
Article -
11
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
12
-
13
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Jump Point Search is one of the path finding algorithm with huge advantage of maintaining zero memory overhead as no preprocessing process involved. …”
Get full text
Get full text
Get full text
Thesis -
14
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
Get full text
Get full text
Thesis -
15
Hybrid ensemble learning techniques for intrusion detection systems in Internet of Things security
Published 2025“…The first technique employed the XGBoost and LightGBM algorithms to solve a binary classification problem across seven different datasets. …”
Get full text
Get full text
UMK Etheses -
16
-
17
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
18
Robotic path planning using rapidly-exploring random trees
Published 2013“…However, the planned path by using basic RRT structure might not always be optimal in terms of path length. …”
Get full text
Get full text
Get full text
Thesis -
19
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
20
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis
