Search Results - (( based detection method algorithm ) OR ( building information systems algorithm ))*

Refine Results
  1. 1

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  2. 2

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation by Anwar, Farhat, Boby, Rounaqul Islam, Rashid, Muhammad Mahbubur, Alam, Md. Monjurul, Shaikh, Z.

    Published 2017
    “…The proposed FDA system is different from traditional fire alarm and detection system in terms of topology as it manages group of buildings in an optimal and efficient manner.Introduction…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Improving K-Means Clustering using discretization technique in Network Intrusion Detection System by Tahir, H.M., Said, A.M., Osman, N.H., Zakaria, N.H., Sabri, P.N.M., Katuk, N.

    Published 2016
    “…The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K-Means clustering technique as to maximize the detection rate and accuracy while minimizing the false alarm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Young and mature oil palm tree detection and counting using convolutional neural network deep learning method by Abd Mubin, Nurulain, Nadarajoo, Eiswary, Mohd Shafri, Helmi Zulhaidi, Hamedianfar, Alireza

    Published 2019
    “…Besides this, there is a lack of research that builds separate detection system for young and mature oil palm, utilizing deep learning approach for oil palm detection and combining geographic information system (GIS) with deep learning approach. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Nowadays, fingerprinting based Wi-Fi positioning systems successfully provide location information to mobile users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Informative top-k class associative rule for cancer biomarker discovery on microarray data by Ong, Huey Fang, Mustapha, Norwati, Hamdan, Hazlina, Rosli, Rozita, Mustapha, Aida

    Published 2020
    “…The discovery of reliable cancer biomarkers is crucial for accurate early detection and clinical diagnosis. One of the strategies is by identifying expression-based cancer biomarkers through integrative microarray data analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Informative top-k class associative rule for cancer biomarker discovery on microarray data by Ong, Huey Fang, Mustapha, Norwati, Hamdan, Hazlina, Rosli, Rozita, Mustapha, Aida

    Published 2020
    “…The discovery of reliable cancer biomarkers is crucial for accurate early detection and clinical diagnosis. One of the strategies is by identifying expression-based cancer biomarkers through integrative microarray data analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Fruity vegetable recognition system using Color Histogram and BRISK features extraction / Siti Hajar Mohd Nasri by Mohd Nasri, Siti Hajar

    Published 2016
    “…In process to extract the two main features, K-means clustering algorithm is used as background subtraction method with combination of Canny’s Edge Detection and Mathematical Morphology Operation for shape extraction. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction by Ahanin, Fatemeh

    Published 2023
    “…In the third method, a hybrid algorithm called LSTM-C-EST, which is a combination of Fuzzy-MDL and LSTM-C is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Human hearing disorder recognition model using eeg-aep based signal by Md Nahidul, Islam

    Published 2022
    “…Firstly, fifteen feature extraction methods were used to extract information from the raw AEP features. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS by Fanos, Ali Mutar

    Published 2019
    “…This is based on highresolution Light Detection and Ranging (LiDAR) techniques both airborne and terrestrial (ALS and TLS). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  20. 20