Search Results - a distribution ((bat algorithm) OR (((function algorithm) OR (detection algorithm))))

Refine Results
  1. 1

    An improved bat algorithm with artificial neural networks for classification problems by Rehman Gillani, Syed Muhammad Zubair

    Published 2016
    “…Therefore, in order to improve the exploration and exploitation behavior of bats, this research proposed an improved Bat with Gaussian Distribution (BAGD) algorithm that takes small step lengths and ensures convergence to global optima. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2017
    “…In this paper, we propose a novel algorithm for improving spectrum sensing in cognitive radio networks by forming coalitions among cognitive radio users in a fading channel environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A novel scheme for performing wireless distributed computing with strip spectral correlation algorithm by Alfaqawi, Mohammed, Chebil, Jalel, Habaebi, Mohamed Hadi, Ramli, Nordin, Mohamad, Hafizal

    Published 2013
    “…To the best of our knowledge, this paper can be considered as the first research for applying wireless distributed computing (WDC) with spectrum sensing which introduces a novel technique to reduce the complexity of one of the practical methods used in cyclostationary feature detection i.e. the strip spectral correlation algorithm (SSCA) by performing WDC. …”
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2017
    “…Specifically, the stable marriage problem is used to formulate the interactions among the cognitive radio users as a matching game for collaborative distributed spectrum sensing under target detection probability constraint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Q-Learning improve the overall exploration strategy, but it also presented a weakness. Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  9. 9

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…Another part of this work focuses on enhancing the stability of the power system using distributed generator (DG). The proposed solution is based on the optimization method developed from a combination of the Artificial Bee Colony and Hill Climbing algorithms (ABC-HC) to give the optimal placement and sizing of DG units to be deployed in the system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fusion of linear and nonlinear functional model for cadastral network adjustment / Nazurah Syahzanani Amiruddin by Amiruddin, Nazurah Syahzanani

    Published 2024
    “…Consequently, the findings have demonstrated the reliability of a hybrid algorithm as an alternative for cadastral network adjustment. …”
    Get full text
    Get full text
    Student Project
  17. 17

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…Furthermore, a trust-based secure routing algorithm is incorporated to dynamically detect misbehavior in terms of packet forwarding for energy-efficient communication among sensor nodes. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique by Mohd Mawardi, Saari, Mohd Herwan, Sulaiman, Kiwa, Toshihiko

    Published 2023
    “…The combination of the high-Tc SQUID magnetometer and the PSO-based reconstruction technique offers a powerful approach for characterizing the MNP core size distribution, and further improvements can be expected from the recent state-of-the-art optimization algorithm to optimize further the computation time and the best objective function value.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Customized fault management system for low distribution automation system by Ahmed, Musse Mohamud, Soo, W. L.

    Published 2008
    “…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. The laboratory results are compared with the simulation results to make the final conclusion of the algorithm function properly.…”
    Get full text
    Get full text
    Proceeding Paper