Search Results - global distribution ((factor algorithm) OR (detection algorithm))
Search alternatives:
- global distribution »
- factor algorithm »
-
1
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
9
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
10
-
11
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…These algorithms are used to obtain the optimal size of distributed generators units to be installed at optimal locations, which are obtained using loss sensitivity factor. …”
Get full text
Get full text
Thesis -
12
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025Article -
13
-
14
An improved bat algorithm with artificial neural networks for classification problems
Published 2016“…Therefore, in order to improve the exploration and exploitation behavior of bats, this research proposed an improved Bat with Gaussian Distribution (BAGD) algorithm that takes small step lengths and ensures convergence to global optima. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
Get full text
Get full text
Article -
16
-
17
-
18
Image reconstruction for solid profile measurement in ERT using non-invasive approach
Published 2017“…The modelled of sensitivity distributions using COMSOL proved that the system is able to detect the liquid-solid regime in vertical pipe. …”
Get full text
Get full text
Get full text
Article -
19
Predicting saliency existence using reduced salient features based on compactness and boundary cues
Published 2020“…The validation of the developed model was tested on the current salient object detection model to observe the performance implication detecting the salient object. …”
Get full text
Get full text
Thesis -
20
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…For each considered case, results demonstrate that Jaya algorithm can produce a global optimum solution with rapid convergence. …”
Get full text
Get full text
Thesis
