Search Results - (( software mitigation method algorithm ) OR ( using selection method algorithm ))
Search alternatives:
- software mitigation »
- mitigation method »
- method algorithm »
- selection method »
- using selection »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj
Published 2023“…To assist the proposed method, the objective functions used to select optimal CH is refined by adding objectives such as CH’s maximum neighbour node and average isolated node probability. …”
Get full text
Get full text
Get full text
Thesis -
3
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
4
Optimal protection relay coordination for overcurrent relays in radial system / Mohd Azri Kasdi
Published 2018“…The studies are conducted by using MATLAB software to implement the optimization method using Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Thesis -
5
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
7
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The CMV can be bounded within one-fourth of the dc-link voltage of a three-phase four-leg inverter using the proposed NSV-MPC technique. MATLAB/Simulink software environment is used for the simulation and the LabVIEW Field programmable gate array (FPGA) rapid prototyping controller is used to validate the proposed control scheme. …”
Get full text
Get full text
Get full text
Thesis -
8
Optimized Decision Forest for Website Phishing Detection
Published 2021“…In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article -
9
Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar
Published 2012“…In this research, Multilayer perception (MLP) of feedforward Artificial Neural Network (ANN) has also been used as the classifier and comparison are made between the SVM and ANN method. …”
Get full text
Get full text
Thesis -
10
Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios
Published 2026“…Multiple classical machine learning algorithms and deep learning models were assessed across diverse benchmark datasets. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Development of new code for optical code division multiple access systems
Published 2011“…The main arguments for using Optical Code Division Multiple Access (OCDMA) are the flexibility of an asynchronous access method, increased security and graceful degradation. …”
Get full text
Thesis -
12
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
13
Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification
Published 2023“…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Multiple equations model selection algorithm with iterative estimation method
Published 2016“…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
Get full text
Get full text
Get full text
Article -
15
Comparison for selection technique in genetic algorithm
Published 2006“…The purpose of this project is to make a comparison for three selection techniques in Genetic Algorithm.The Genetic Algorithm has been implemented in the previous module for Chess Tournament Management System.Base on previous system the selection method only using randomize.By this project module,only three selections method were use for the comparison.They are Roulette Wheel, Steady-State and Rank selection.The result for this comparison has determined the appropriate selection for Genetic Algorithm implementation in Chess Tournament Management System.This will help Chess Tournament Management System to provide a better optimize schedule.…”
Get full text
Get full text
Undergraduates Project Papers -
16
A decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for bachelor in multimedia / Asmaa Musa
Published 2007“…A key stage in the system process is the selection of features. This paper discuss about a decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for Bachelor in Multimedia. …”
Get full text
Get full text
Thesis -
17
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Results of the reviewed techniques show that attribute selection methods capable to resolve the limitations in ID3 algorithm and increase the performance of the method. …”
Get full text
Get full text
Get full text
Article -
18
Aco-based feature selection algorithm for classification
Published 2022“…The classification of this type of dataset requires Feature Selection (FS) methods for the extraction of useful information. …”
Get full text
Get full text
Thesis -
19
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
20
Enhanced selection method for genetic algorithm to solve traveling salesman problem
Published 2017“…Stochastic Universal Selection (SUS) is one of the selection methods in GA which is considered fast but it leads to lower quality solution.Although using Rank Method Selection (RMS) may lead to high quality solution, it has long runtime.In this work, an enhanced selection method is presented which maintains both fast runtime and high solution quality.First, we present a framework to solve TSP using GA with the original selection method SUS. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
