Search Results - (( data detection based algorithm ) OR ( peer evaluation method algorithm ))
Search alternatives:
- method algorithm »
- detection based »
- peer evaluation »
- data detection »
-
1
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
3
-
4
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
5
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
7
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
Get full text
Get full text
Get full text
Thesis -
8
Fast temporal video segmentation based on Krawtchouk-Tchebichef moments
Published 2020“…The proposed algorithm is based on orthogonal moments which are considered as features to detect transitions. …”
Get full text
Get full text
Get full text
Article -
9
Failure detection analysis of grid-connected photovoltaic system using an improved comparative based method / Fatin Azirah Mohd Shukor
Published 2022“…Moreover, the evaluation on the reliability of the FD analysis algorithm applied using large amount of field data instead of simulated data is still limited and significant, especially in the context of tropical climate conditions. …”
Get full text
Get full text
Thesis -
10
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…All the algorithms were pretrained from ImageNet data-base before training with the wafer defect images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques
Published 2015“…Regarding the detection, a post processing method based on a combination of pixel-based and objects-based methods was proposed. …”
Get full text
Get full text
Thesis -
12
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…This paper shows the potential of optimization-based UAV problematic vibration detection. A proposed fitness function based on the frequency domain has been detailed. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
15
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
16
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…This paper shows the potential of optimization-based UAV problematic vibration detection. A proposed fitness function based on the frequency domain has been detailed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
18
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The results of the proposed search-based test data generator show significant performance compared to the existing search-based test data generator.…”
Get full text
Get full text
Get full text
Thesis -
19
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
20
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article
