Search Results - ((generation algorithm) OR (detection algorithm))

Refine Results
  1. 1

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…Active detection algorithm generates disturbances at the output by Positive feedback and Continuous feedback signal injection which is based on DQ implementation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and non-self discrimination in intrusion detection system (IDS).In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection.Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Generation of new low-complexity March algorithms for optimum faults detection in SRAM by Jidin, Aiman Zakwan, Hussin, Razaidi, Lee, Weng Fook, Mispan, Mohd Syafiq, Zakaria, Nor Azura, Loh, Wan Ying, Zamin, Norshuhani

    Published 2023
    “…A high-complexity test algorithm like the March MSS (18N) can guarantee the detection of all unlinked static faults in SRAM. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fault detection with optimum March test algorithm by Zakaria, Nor Azura, Wan Hassan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Xiao, Qing Wen

    Published 2013
    “…The automation hardware was designed to give the flexibility to the user to generate other new March Algorithm prior to the selected algorithm and analyzed the performance in terms of fault detection and power consumption.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2021
    “…This paper proposed the fuzzy-ID3 (FID3) algorithm, a fuzzy decision tree as the classification method in breast cancer detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Experimental evaluation of data fusion algorithm for residual generation in detecting UAV servo actuator fault by Sahwee Z., Rahman N.A., Sahari K.S.M.

    Published 2023
    “…Algorithms; Data fusion; Hardware; Military vehicles; Redundancy; Software reliability; Unmanned aerial vehicles (UAV); Analytical redundancy; Data fusion algorithm; Experimental evaluation; Fault detection algorithm; Hostile environments; Model reference methods; On-board fault detection; Software and hardwares; Fault detection…”
    Article
  11. 11

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network by Jamaludin, Sallim, Rozlina, Mohamed, Roslina, Abd Hamid

    Published 2015
    “…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…Second, four different are generated based on the scenario detected. Hence, two scripts written in SenScript will be generated where one is call routing.csc and battery.csc files. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…To overcome this problem, a genetic algorithm approach is proposed. Genetic Algorithm (GA) is most frequently employed as a robust technology based on machine learning for designing IDS. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The results demonstrated that the proposed method could generate an optimal collision-free path. Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
    Get full text
    Thesis
  20. 20