Search Results - (( using function based algorithm ) OR ( using mitigation method algorithm ))

Refine Results
  1. 1

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter by Mohamad @ Abd Rahman, Syahrul Hisham, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abd. Wahab, Noor Izzri, Jidin, Auzani

    Published 2023
    “…The algorithm's effectiveness in operation for the Shunt APF is validated through simulation using MATLAB/Simulink and experiment work by integrating the algorithm with DSPACE RS1104. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Novel farmland fertility algorithm based PIDPSS design for SMIB angular stability enhancement by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Othman, Mohammad Lutfi, Mohd Jaffar, Mai Zurwatul Ahlam

    Published 2020
    “…A new metaheuristics method called Farmland Fertility Algorithm (FFA) inspired by nature is proposed for optimal design of PIDPSS using a robust ISTSE objective function which had to be minimized. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei by Yousef Ali, Mohammed Al-Gumaei

    Published 2017
    “…Novel utility and cost functions proposed in this work are the method to derive efficient distributed power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Electricity distribution network for low and medium voltages based on evolutionary approach optimization by Hasan, Ihsan Jabbar

    Published 2015
    “…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Impact of BPL penalty functions and PSF models in PET/CT radial spatial resolution recovery by Si, Wang Jie

    Published 2024
    “…Methods: In-house spatial resolution phantom acquisition was conducted using single F-18 point source method with activity > 5mCi/cc. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj by Bryan Raj , Peter Jabaraj

    Published 2023
    “…To assist the proposed method, the objective functions used to select optimal CH is refined by adding objectives such as CH’s maximum neighbour node and average isolated node probability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…The stability of the system is ensured through Lyapunov function with the help of backsteping control method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20