Search Results - (( using evaluation method algorithm ) OR ( software mitigation method algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Electricity distribution network for low and medium voltages based on evolutionary approach optimization by Hasan, Ihsan Jabbar

    Published 2015
    “…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj by Bryan Raj , Peter Jabaraj

    Published 2023
    “…As such, this thesis proposes a hybrid metaheuristic method that consists of Sperm Swarm Optimization (SSO) algorithm and Genetic Algorithm (GA), which is termed HSSOGA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…It allows one single instance of software to serve various clients. Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
    text::Thesis
  7. 7

    Machine Learning Applications in Offense Type and Incidence Prediction by Balaji, R., Manjula Sanjay, Koti, Harprith, Kaur

    Published 2024
    “…Artificial Intelligence (AI) techniques encompass variouscomputational methods and algorithms designed to enable machines to perform tasks that typically require human intelligence. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Effect of mesh coarseness on slope stability analysis using 2D and 3D finite element method by Noraida Mohd Saim, Anuar Kasa

    Published 2024
    “…However, the stability analyses using Finite Element Method (FEM) have gained significant attention in geotechnical engineering due to their ability to simulate slope behaviour and predict stability accurately by employing mathematical models and computational algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Optimized Decision Forest for Website Phishing Detection by Balogun, A.O., Mojeed, H.A., Adewole, K.S., Akintola, A.G., Salihu, S.A., Bajeh, A.O., Jimoh, R.G.

    Published 2021
    “…In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
    Get full text
    Get full text
    Article
  12. 12

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…To improve SDN's resilience and performance, early detection, mitigation strategies, and structured approaches are necessary. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…In order to validate the proposed method, a set of measured electromagnetic fields are applied on proposed algorithm and the evaluated currents are compared to the corresponding measured current as well as the results are discussed accordingly. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Evaluation of dynamic programming among the existing stereo matching algorithms by Teo, Chee Huat, Nurulfajar, Abd Manap

    Published 2015
    “…The dynamic programming algorithm used on this research is the current method as its disparity estimates at a particular pixel and all the other pixels unlike the old methods which with scanline based of dynamic programming. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method by Mohammed, Rawia Tahrir, Yaakob, Razali, Mohd Sharef, Nurfadhlina, Abdullah, Rusli

    Published 2021
    “…Thus, unify a set of most suitable evaluation criteria of the MaOO is needed. This study proposed a distinct unifying model for the MaOO evaluation criteria using the fuzzy Delphi method. …”
    Get full text
    Get full text
    Article
  18. 18

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The tone mapping algorithm was first compressed using global tone mapping method. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20