Search Results - (( based detection method algorithm ) OR ( building information systems algorithm ))*
Search alternatives:
- systems algorithm »
- method algorithm »
- based detection »
-
1
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
2
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
3
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
4
Deep learning object detector using a combination of Convolutional Neural Network (CNN) architecture (MiniVGGNet) and classic object detection algorithm
Published 2020“…The system consists of two main processes, which are classification and detection. …”
Get full text
Get full text
Get full text
Article -
5
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…The proposed FDA system is different from traditional fire alarm and detection system in terms of topology as it manages group of buildings in an optimal and efficient manner.Introduction…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Visualization on colour based flow vector of thermal image for movement detection during interactive session
Published 2018“…Conventional system might cause false information with the present of shadow. …”
Get full text
Get full text
Get full text
Article -
7
Improving K-Means Clustering using discretization technique in Network Intrusion Detection System
Published 2016“…The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K-Means clustering technique as to maximize the detection rate and accuracy while minimizing the false alarm. …”
Get full text
Get full text
Conference or Workshop Item -
8
Young and mature oil palm tree detection and counting using convolutional neural network deep learning method
Published 2019“…Besides this, there is a lack of research that builds separate detection system for young and mature oil palm, utilizing deep learning approach for oil palm detection and combining geographic information system (GIS) with deep learning approach. …”
Get full text
Get full text
Get full text
Article -
9
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Nowadays, fingerprinting based Wi-Fi positioning systems successfully provide location information to mobile users. …”
Get full text
Get full text
Conference or Workshop Item -
10
Informative top-k class associative rule for cancer biomarker discovery on microarray data
Published 2020“…The discovery of reliable cancer biomarkers is crucial for accurate early detection and clinical diagnosis. One of the strategies is by identifying expression-based cancer biomarkers through integrative microarray data analysis. …”
Get full text
Get full text
Get full text
Article -
11
Informative top-k class associative rule for cancer biomarker discovery on microarray data
Published 2020“…The discovery of reliable cancer biomarkers is crucial for accurate early detection and clinical diagnosis. One of the strategies is by identifying expression-based cancer biomarkers through integrative microarray data analysis. …”
Get full text
Get full text
Get full text
Article -
12
Fruity vegetable recognition system using Color Histogram and BRISK features extraction / Siti Hajar Mohd Nasri
Published 2016“…In process to extract the two main features, K-means clustering algorithm is used as background subtraction method with combination of Canny’s Edge Detection and Mathematical Morphology Operation for shape extraction. …”
Get full text
Get full text
Thesis -
13
An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction
Published 2023“…In the third method, a hybrid algorithm called LSTM-C-EST, which is a combination of Fuzzy-MDL and LSTM-C is proposed. …”
Get full text
Get full text
Get full text
Thesis -
14
Human hearing disorder recognition model using eeg-aep based signal
Published 2022“…Firstly, fifteen feature extraction methods were used to extract information from the raw AEP features. …”
Get full text
Get full text
Thesis -
15
Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS
Published 2019“…This is based on highresolution Light Detection and Ranging (LiDAR) techniques both airborne and terrestrial (ALS and TLS). …”
Get full text
Get full text
Thesis -
16
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
17
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
19
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
20
