Search Results - (( user detection method algorithm ) OR ( changes optimization method algorithm ))
Search alternatives:
- changes optimization »
- method algorithm »
- user detection »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
2
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
3
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
4
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
Get full text
Get full text
Get full text
Article -
6
Optimal operation of hydropower reservoirs under climate change
Published 2024“…The study�s novelty is the adaptive and nonadaptive rule curves for power production using optimization algorithms under the climate change model. …”
Article -
7
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The User Profile Filter (UPF) was proposed to aid the SVM algorithm to classify the captured traffics into normal and abnormal behavior. …”
Get full text
Get full text
Get full text
Thesis -
8
Optimization Of Bar Linkage By Using Genetic Algorithms
Published 2005“…This thesis presents the method of using simple Genetic Algorithms (GAs) in optimizing the size of bar linkage with discrete design variables and continues design variables. …”
Get full text
Get full text
Monograph -
9
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
10
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…Cooperative spectrum sensing (CSS) in cognitive radio (CR) has been widely investigated to be considered as a spectrum scanning mechanism that allows secondary users or cognitive radio users (SUs) to use detected spectrum holes caused by primary users (PUs) absence. …”
Get full text
Get full text
Conference or Workshop Item -
11
Optimal operation of hydropower reservoirs under climate change
Published 2023“…The study�s novelty is the adaptive and nonadaptive rule curves for power production using optimization algorithms under the climate change model. …”
Article -
12
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. The approach aims to offer a solution to protect users from potential threats such as Banking Trojan malware. …”
Get full text
Get full text
Thesis -
13
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
14
Recent Efficient Iterative Algorithms on Cognitive Radio Cooperative Spectrum Sensing to Improve Reliability and Performance
Published 2016“…In cognitive radio (CR), cooperative spectrum sensing (CSS) has been extensively explored to be accounted for in a spectrum scanning method that permits secondary users (SUs) or cognitive radio users to utilize discovered spectrum holes caused by the absence of primary users (PUs). …”
Get full text
Get full text
Article -
15
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
16
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…All the classification algorithms were evaluated by using the k-fold cross validation method. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
19
A multimodal biometric detection system via rotated histograms using hough lines
Published 2015“…The new system outperformed many methods in the literature reported using conventional detection methods. …”
Get full text
Get full text
Article -
20
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. The overall result significantly indicates that a novel security alert framework using dynamic tweet-based features for phishing detection on Twitter has been formulated. …”
Get full text
Get full text
Thesis
