Search Results - (( using optimization modified algorithm ) OR ( time detection method algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Thus, this study is looking for better, new dataset and more reliable optimized method for detecting the intrusion with highest accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Results show that the proposed method is able to detect islanding conditions with 100% accuracy, 100% detection rate and 0% false alarm with detection time of less than 0.19s. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A novel islanding detection technique using modified Slantlet transform in multi-distributed generation by Hizam, Hashim, Ahmadipour, Masoud, Mohd Radzi, Mohd Amran, Othman, Mohammad Lutfi, Chireh, Nikta

    Published 2019
    “…A Harmony Search Algorithm (HSA) is used to optimally specify suitable scales of Slantlet transform and Slantlet decomposition levels for accurate islanding classification. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A Subspace Approach for Extracting Signals Highly Corrupted by Colored Noise by Yusoff, Mohd Zuki, Hussin, Fawnizu Azmadi

    Published 2010
    “…The simulation results produced by the post-modified SSA2 algorithm, show a higher degree of consistencies in detecting the VEP's P100, P200, and P300 peaks, in comparisons to the pre-modified SSA1 method. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  15. 15

    Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi by Seyed Hossein, Mahdavi

    Published 2016
    “…As a consequence, the computational performance of structural health monitoring strategies will be directly influenced by the higher computational competency and convergence rate of the proposed wavelet-based method for structural simulation. Accordingly, in the second part of this research, the procedure of structural identification and damage detection has been developed by employing the wavelet-based method through the modified genetic algorithms (GAs) to optimally solve inverse problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Video colorization using canny optimization technique / Irwin Kevin Mueson by Irwin Kevin Mueson

    Published 2016
    “…This is a hybrid technique from Colorization using Optimization, which was modified and improved the algorithms by adding Canny Edge Detection to improve the colorization process on the grayscale image or frames. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches by Ahmad Khan, Muzammil, Mahmood Khan, Shariq, Subramaniam, Siva Kumar

    Published 2023
    “…Based on CSP behavior, we introduced the Multi Behavior Analysis-based Nomadic People Optimizer method. Every CSP’s trust value is modified based on user feedback over time. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Modelling of cupping suction system based on system identification method by Suresh, Kavindran, Ghazali, M. R., Ahmad, M. A.

    Published 2022
    “…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…Results showed that the filter parameters selection could significantly affect the amplitude of the sEMG as well as it may conceal the exact onset/offset time of the signal. The developed algorithm for the crosstalk recordings detection shows ability in determining the presence of the overlapped measurements period. …”
    Get full text
    Get full text
    Thesis