Search Results - (( based detection method algorithm ) OR ( data normalization based algorithm ))
Search alternatives:
- normalization based »
- data normalization »
- method algorithm »
- based detection »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
2
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
3
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…Furthermore, Network traffic prediction algorithms based on SVM such as EaSVM have commented about the fundamental difficulties in achieving an accurate declaration that defines anomaly which suppose to solve the problem of the high rate of false positive alarm and finding excellent ways that guarantees to clear up pending issues of the network traffic normality such as the alluvial data noise of the TAaM method. …”
Get full text
Get full text
Get full text
Thesis -
7
A clustering-based method for outlier detection under concept drift
Published 2024“…The proposed approach CADSD (Cluster-based Anomaly Detection with Streaming Data), operates in real-time without pre-training. …”
Get full text
Get full text
Get full text
Article -
8
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
10
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
11
-
12
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…This research addressed severe contamination or occlusion presence in a face recognition based on image data. A modified version of the existing least trimmed square, LTS method with genetic algorithm (LTS with GAs) was proposed to cater the problem of noise or occlusion and improve the performance of face recognition. …”
Get full text
Get full text
Thesis -
13
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
14
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Conference or Workshop Item -
15
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
16
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
17
Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm
Published 2019“…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
Get full text
Get full text
Thesis -
18
Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques
Published 2015“…Regarding the detection, a post processing method based on a combination of pixel-based and objects-based methods was proposed. …”
Get full text
Get full text
Thesis -
19
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
20
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article
