Search Results - (( user detection method algorithm ) OR ( using optimization methods algorithm ))
Search alternatives:
- optimization methods »
- methods algorithm »
- method algorithm »
- user detection »
-
1
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…In fact, all steps of genetic algorithm (GA), particle swarm optimization (PSO) and imperialistic competitive algorithm (ICA) will be well mentioned in details and investigated on cognitive radio cooperative spectrum sensing (CRCSS) method. …”
Get full text
Get full text
Conference or Workshop Item -
2
SINR improvement using Firefly Algorithm (FA) for Linear Constrained Minimum Variance (LCMV) beamforming technique
Published 2023Conference Paper -
3
The optimization of stepping stone detection: packet capturing steps
Published 2006“…The proposed method is to use small size of user buffer and kernel buffer. …”
Get full text
Get full text
Get full text
Article -
4
The optimization of stepping stone detection : packet capturing steps
Published 2006“…The proposed method is to use small size of user buffer and kernel buffer. …”
Get full text
Get full text
Get full text
Article -
5
The optimization of stepping stone detection: Packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism.The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system.The proposed method is to use small size of user buffer and kernel buffer.Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested.Results from the experiment were analyzed. …”
Get full text
Get full text
Get full text
Article -
6
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…HBA as metahueristic algorithm is used to optimize the network training process of ANN to improve their performances. …”
Get full text
Get full text
Get full text
Article -
7
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
8
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…In addition, DL-based malware detection methods often entail single classifiers. …”
Get full text
Get full text
Get full text
Article -
9
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
10
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
Get full text
Get full text
Thesis -
11
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
Get full text
Get full text
Thesis -
12
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
Get full text
Get full text
Thesis -
13
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
15
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The goal of this study is to investigate and develop a reliable and accurate method for detecting gait activities on an inclined surface such as stairs using smartphones as the sensing device. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
17
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This project research will present the PMCC Heatmap to choose the optimal attributes for using machine learning to detect cryptojacking in order to utilise machine learning to detect embedded malware. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Leaf condition analysis using convolutional neural network and vision transformer
Published 2024“…Besides, existing leaf disease detection programs do not provide an optimized user’s experience. …”
Get full text
Get full text
Get full text
Article -
19
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
20
Designing an integrated AIOT system for tracking class attendance
Published 2024“…Basics and ensures that the software is more secure than the previous traditional attendance method using roll-less slides. For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
