Search Results - (( _ application ((acs algorithm) OR (means algorithm)) ) OR ( rate detection based algorithm ))*
Search alternatives:
- means algorithm »
- detection based »
- rate detection »
- acs algorithm »
-
1
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
Get full text
Get full text
Get full text
Article -
2
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Improved Switching-Basedmedian Filter For Impulse Noise Removal
Published 2013“…Broad impulse noise model has been employed for the evaluation process, to investigate the robustness of the method. Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
Get full text
Get full text
Thesis -
4
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
Get full text
Get full text
Get full text
Article -
5
Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus
Published 2018“…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
Get full text
Get full text
Get full text
Article -
6
Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus
Published 2017“…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus
Published 2018“…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
Get full text
Get full text
Get full text
Article -
8
Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus
Published 2017“…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013“…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013“…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
Get full text
Get full text
Article -
12
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
13
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm achieved an average of 87% precision, 83% of recall, 85% of F-score and 82% of accuracy rate.…”
Get full text
Get full text
Thesis -
14
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…A new detection algorithm based on QR decomposition, denoted as LC-QR, is proposed. …”
Get full text
Get full text
Thesis -
15
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
Get full text
Get full text
Thesis -
16
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
17
A hybrid framework based on neural network MLP and means clustering for intrusion detection system
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Design and optimization of Levenberg-Marquardt based Neural Network Classifier for EMG signals to identify hand motions
Published 2013“…Different structures of neural network, based on the number of hidden neurons and two prominent training algorithms, have been considered in the research to find out their applicability for EMG signal classification. …”
Get full text
Get full text
Get full text
Article -
19
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Anomaly-based intrusion detection using fuzzy rough clustering
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item
