Search Results - (( _ application ((acs algorithm) OR (means algorithm)) ) OR ( rate detection based algorithm ))*

Refine Results
  1. 1

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Broad impulse noise model has been employed for the evaluation process, to investigate the robustness of the method. Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2017
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2017
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Anomaly-based intrusion detection through K-means clustering and naives Bayes classification by Mohamed Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md. Nasir

    Published 2013
    “…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm achieved an average of 87% precision, 83% of recall, 85% of F-score and 82% of accuracy rate.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…A new detection algorithm based on QR decomposition, denoted as LC-QR, is proposed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Design and optimization of Levenberg-Marquardt based Neural Network Classifier for EMG signals to identify hand motions by Ibrahimy, Muhammad Ibn, Ahsan, Md. Rezwanul, Khalifa, Othman Omran

    Published 2013
    “…Different structures of neural network, based on the number of hidden neurons and two prominent training algorithms, have been considered in the research to find out their applicability for EMG signal classification. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20