Search Results - different ((generation algorithm) OR (detection algorithm))
Search alternatives:
- generation algorithm »
-
1
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…Findings shows that the propose algorithm generates different fault syndromes for SAFs and TFs hence make them distinguishable. …”
Get full text
Get full text
Thesis -
2
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
Get full text
Get full text
Get full text
Thesis -
3
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
4
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Smart and energy aware routing for the internet of mobile things
Published 2021“…First function will be to filter out the disqualify node in the network based on their respective battery capacity. Second, four different are generated based on the scenario detected. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
7
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…The experimental results showed that the proposed algorithms could be practical in terms of effectively detecting road lines and generate lane detection…”
Get full text
Get full text
Get full text
Article -
8
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
Get full text
Conference or Workshop Item -
9
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
10
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…The RFNN algorithm is developed to avoid overfitting, improve detection accuracy, and accelerate training and inference. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
12
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…The performance of these receivers is evaluated as a function of the number of antenna elements, Rake fingers and number of users. We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
Get full text
Get full text
Thesis -
13
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
Get full text
Get full text
Get full text
Article -
14
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
16
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…The algorithm is improved with Particle Swarm Optimization that trains three different supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
20
The optimization of stepping stone detection: packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article
