Search Results - (( software mitigation method algorithm ) OR ( using selection method algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj by Bryan Raj , Peter Jabaraj

    Published 2023
    “…To assist the proposed method, the objective functions used to select optimal CH is refined by adding objectives such as CH’s maximum neighbour node and average isolated node probability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimal protection relay coordination for overcurrent relays in radial system / Mohd Azri Kasdi by Mohd Azri, Kasdi

    Published 2018
    “…The studies are conducted by using MATLAB software to implement the optimization method using Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…The CMV can be bounded within one-fourth of the dc-link voltage of a three-phase four-leg inverter using the proposed NSV-MPC technique. MATLAB/Simulink software environment is used for the simulation and the LabVIEW Field programmable gate array (FPGA) rapid prototyping controller is used to validate the proposed control scheme. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Optimized Decision Forest for Website Phishing Detection by Balogun, A.O., Mojeed, H.A., Adewole, K.S., Akintola, A.G., Salihu, S.A., Bajeh, A.O., Jimoh, R.G.

    Published 2021
    “…In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
    Get full text
    Get full text
    Article
  9. 9

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…In this research, Multilayer perception (MLP) of feedforward Artificial Neural Network (ANN) has also been used as the classifier and comparison are made between the SVM and ANN method. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios by Marlindawati, ., Mohammad, Azhar, Esha, Sabir

    Published 2026
    “…Multiple classical machine learning algorithms and deep learning models were assessed across diverse benchmark datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…The main arguments for using Optical Code Division Multiple Access (OCDMA) are the flexibility of an asynchronous access method, increased security and graceful degradation. …”
    Get full text
    Thesis
  12. 12

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Comparison for selection technique in genetic algorithm by Muhamad Azree, Mat Said

    Published 2006
    “…The purpose of this project is to make a comparison for three selection techniques in Genetic Algorithm.The Genetic Algorithm has been implemented in the previous module for Chess Tournament Management System.Base on previous system the selection method only using randomize.By this project module,only three selections method were use for the comparison.They are Roulette Wheel, Steady-State and Rank selection.The result for this comparison has determined the appropriate selection for Genetic Algorithm implementation in Chess Tournament Management System.This will help Chess Tournament Management System to provide a better optimize schedule.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    A decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for bachelor in multimedia / Asmaa Musa by Musa, Asmaa

    Published 2007
    “…A key stage in the system process is the selection of features. This paper discuss about a decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for Bachelor in Multimedia. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…Results of the reviewed techniques show that attribute selection methods capable to resolve the limitations in ID3 algorithm and increase the performance of the method. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Aco-based feature selection algorithm for classification by Al-mazini, Hassan Fouad Abbas

    Published 2022
    “…The classification of this type of dataset requires Feature Selection (FS) methods for the extraction of useful information. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced selection method for genetic algorithm to solve traveling salesman problem by Jubeir, Mohammed, Almazrooie, Mishal, Abdullah, Rosni

    Published 2017
    “…Stochastic Universal Selection (SUS) is one of the selection methods in GA which is considered fast but it leads to lower quality solution.Although using Rank Method Selection (RMS) may lead to high quality solution, it has long runtime.In this work, an enhanced selection method is presented which maintains both fast runtime and high solution quality.First, we present a framework to solve TSP using GA with the original selection method SUS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item