Search Results - (( solution detection based algorithm ) OR ( program implementation model algorithm ))
Search alternatives:
- program implementation »
- implementation model »
- solution detection »
- detection based »
- model algorithm »
-
1
-
2
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
Get full text
Get full text
Thesis -
3
-
4
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Analytical model for partially prestressed concrete beam-column elements
Published 2017“…For this purpose, constitutive law and mathematical model for the three dimensional PPC beam-column element are formulated and a special finite element algorithm is developed. …”
Get full text
Get full text
Get full text
Thesis -
6
Development of dynamic programming algorithm for maintenance scheduling problem
Published 2020“…The dynamic programming model developed for this research reflected the flow of the maintenance activity of the company and implemented the model by Lieberman and Hillier (2010). …”
Get full text
Get full text
Thesis -
7
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…However, the MBGWO has several issues in finding a good quality solution. Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
8
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph -
9
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…In a source searching task, two possible scenarios can occur: source detected and source not detected. In this study, a complete solution to the two scenarios through an adaptive algorithm switching strategy is explored. …”
Get full text
Get full text
Thesis -
11
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…Microarray-based cancer biomarker detection is one of the popular trends for cancer classification. …”
Get full text
Get full text
Get full text
Article -
12
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…In this report, it analyzes an application of repetitive control algorithm that deal with periodic disturbance.. To investigates the possibility of using a truncated finite impulse response (FIR) model approximation to implement a well-known gradient type repetitive control algorithm. …”
Get full text
Get full text
Student Project -
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
14
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Neural network algorithm-based fall detection modelling
Published 2020“…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
Get full text
Get full text
Get full text
Article -
17
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…A matheuristic approach based on a reduced two-stage Stochastic Integer Linear Programming (SILP) model is presented. The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
18
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
19
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
20
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis
