Search Results - (( data application using algorithm ) OR ( variable detection learning algorithm ))
Search alternatives:
- variable detection »
- detection learning »
- learning algorithm »
- data application »
- using algorithm »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
2
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009Get full text
Get full text
Article -
3
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
4
Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm
Published 2023“…The primary goal is to use the Random Forest algorithm, an effective machine learning technique, to predict instances of cheating based on the behavioural patterns of participants. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee
Published 2023“…Any resampling algorithm is not a necessity in the case of this proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS
Published 2011“…For this hybrid intelligent system, the selection of appropriate variables from hundreds of boiler operation variables with optimal neural network topology combinations to monitor boiler trips was a major concern. …”
Get full text
Get full text
Thesis -
7
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
Get full text
Get full text
Thesis -
9
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…This is further worsen by the use of single sensors modality and machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
10
Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm
Published 2015“…These classification algorithms are trained using the features extracted from the patient data in order for them to learn the relationship between the features and the end-result (FLD present or absent). …”
Get full text
Get full text
Get full text
Article -
11
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
12
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Non-fungible token based smart manufacturing to scale Industry 4.0 by using augmented reality, deep learning and industrial Internet of Things
Published 2023“…The next phase was deploying deep learning algorithms on a dataset having data generated from IIoT devices and sensors. …”
Get full text
Get full text
Get full text
Article -
14
Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs)
Published 2023“…No pattern was detected regarding selecting the input variables as they are mainly based on the context of the study and the availability of data. …”
Article -
15
Pure intelligent monitoring system for steam economizer trips
Published 2023“…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
Conference Paper -
16
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
17
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
18
-
19
Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis
Published 2011“…Various feedforward neural networks were performed using different learning algorithms. The best algorithm was found to be Levenberg–Marquardt (LM) for a network composed of two hidden layers with six and seven neurons in the first and second layers, respectively for xylitol stearate and xylitol palmitate and also seven and five neurons in the first and second layers for xylitol caprate, with hyperbolic tangent sigmoid transfer function. …”
Get full text
Get full text
Thesis -
20
Oil palm female inflorescences anthesis stages identification using selected emissivities through thermal imaging and Machine Learning
Published 2022“…This research studies different Machine Learning (ML) classification and ensemble techniques for the assessment of the four pollination stages consist of pre-anthesis I, pre-anthesis II, pre-anthesis III, and anthesis using thermal imaging. …”
Get full text
Get full text
Get full text
Thesis
