Search Results - (( data detection method algorithm ) OR ( _ normalization based algorithm ))
Search alternatives:
- normalization based »
- method algorithm »
- _ normalization »
- data detection »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
2
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
3
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
5
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…Both methods used DARPA 98- 99 dataset and Lincoln Labs data. …”
Get full text
Get full text
Get full text
Thesis -
7
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A clustering-based method for outlier detection under concept drift
Published 2024“…However, challenges may arise from assuming the majority of data comprises normal instances, particularly during sudden spikes in attack data, potentially diminishing algorithm effectiveness. …”
Get full text
Get full text
Get full text
Article -
9
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
10
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
11
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
12
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
13
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Conference or Workshop Item -
14
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…This research addressed severe contamination or occlusion presence in a face recognition based on image data. A modified version of the existing least trimmed square, LTS method with genetic algorithm (LTS with GAs) was proposed to cater the problem of noise or occlusion and improve the performance of face recognition. …”
Get full text
Get full text
Thesis -
15
-
16
Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm
Published 2019“…For characters was at 92.3077% improvement, which is better that normal KNN algorithm which exhibited an 86.1429% accuracy in detecting.…”
Get full text
Get full text
Thesis -
17
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
18
Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques
Published 2015“…Regarding the detection, a post processing method based on a combination of pixel-based and objects-based methods was proposed. …”
Get full text
Get full text
Thesis -
19
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
20
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article
