Search Results - (( user detection method algorithm ) OR ( based optimization method algorithm ))*

Refine Results
  1. 1

    Recent Efficient Iterative Algorithms on Cognitive Radio Cooperative Spectrum Sensing to Improve Reliability and Performance by Akbari, M., Reza, A.W., Noordin, K.A., Dimyati, K., Manesh, M.R., Hindia, M.N.

    Published 2016
    “…In fact, all steps of genetic algorithm (GA), particle swarm optimization (PSO), and imperialistic competitive algorithm (ICA) will be well mentioned in detail and investigated on cognitive radio cooperative spectrum sensing (CRCSS) method. …”
    Get full text
    Get full text
    Article
  2. 2

    Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS by Akbari, M., Reza, A.W., Noordin, K.A., Manesh, M.R., Hindia, M.N.

    Published 2014
    “…This paper focuses on optimality of analytical study on the common soft fusion (SDF) CSS based on different iterative algorithms which confirm low total probability of error and high probability of detection in details. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Optimal resource allocation for NOMA wireless networks by Albogamy, Fahad R., Aiyashi, M. A., Hashim, Fazirul Hisyam, Imran Khan, Choi, Bong Jun

    Published 2022
    “…The major goal is to maximize the users’ maximum weighted sum rate. The suggested algorithm’s most notable feature is that it converges to the global optimal solution. …”
    Get full text
    Get full text
    Article
  7. 7

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…It consists of several steps that make this method as an optimal edge detector. The objective of this research is gained from understanding of the problem statement. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  10. 10

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Memory testing is a method that requires an algorithm capable of detecting faulty memory as comprehensively as possible to facilitate the efficient manufacture of fault free memory products. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches by Ahmad Khan, Muzammil, Mahmood Khan, Shariq, Subramaniam, Siva Kumar

    Published 2023
    “…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…Unlike other control methods applied to industrial robotic systems in the sense of giving specific trajectory to be tracked, ERD physically interacts alongside with the user. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…Most of the existing algorithms consider the noise filtering step precedes trajectory segmentation step which mean that there is no preprocessing method to partition trajectory into set of segments and remove noise points in real time with low computational cost. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli by Rosli, Muhammad Helmi

    Published 2015
    “…However, in real working condition where some computer are serving users processes, the dynamic algorithm provides a potential alternative.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Drowsiness Detection Using Ocular Indices from EEG Signal by Tarafder, S., Badruddin, N., Yahya, N., Nasution, A.H.

    Published 2022
    “…Different machine learning classification models, including the decision tree, the support vector machine (SVM), the K-nearest neighbor (KNN) method, and the bagged and boosted tree models, were trained based on the seven selected features. …”
    Get full text
    Get full text
    Article
  20. 20

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…The Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for role-based access control and judge contracts. To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
    Article