Search Results - (( based evaluation methods algorithm ) OR ( data ((detection path) OR (detection a)) algorithm ))
Search alternatives:
- evaluation methods »
- methods algorithm »
- based evaluation »
- detection path »
- detection a »
-
1
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
Get full text
Get full text
Get full text
Thesis -
2
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
Get full text
Get full text
Get full text
Article -
3
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
5
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
6
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
7
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
8
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
Article -
9
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
10
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
12
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…Rapid growth of multimedia data in cyberspace caused a swift rise in data transmission volume. …”
Get full text
Get full text
Get full text
Thesis -
13
Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques
Published 2015“…Regarding the detection, a post processing method based on a combination of pixel-based and objects-based methods was proposed. …”
Get full text
Get full text
Thesis -
14
Fast temporal video segmentation based on Krawtchouk-Tchebichef moments
Published 2020“…The proposed algorithm is based on orthogonal moments which are considered as features to detect transitions. …”
Get full text
Get full text
Get full text
Article -
15
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Each image went through the embedding process by the evaluated algorithms. This enhanced image data numbers then went through Logistic Regression as a classifier. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Failure detection analysis of grid-connected photovoltaic system using an improved comparative based method / Fatin Azirah Mohd Shukor
Published 2022“…Moreover, the evaluation on the reliability of the FD analysis algorithm applied using large amount of field data instead of simulated data is still limited and significant, especially in the context of tropical climate conditions. …”
Get full text
Get full text
Thesis -
19
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis
