Search Results - (( data detection method algorithm ) OR ( data internalization based algorithm ))
Search alternatives:
- internalization based »
- data internalization »
- method algorithm »
- data detection »
-
1
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
On density-based data streams clustering algorithms: A survey
Published 2017“…Density-based method is a remarkable class in clustering data streams, which has the ability to discover arbitrary shape clusters and to detect noise. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…The purpose of this study is to apply the K-Means algorithm to perform clustering on COVID-19 data to determine the high spread of the virus in regions in Indonesia based on the frequency of the data. …”
Get full text
Get full text
Book Section -
6
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…Then, the results performance of the agglomerative clustering algorithms were compared and the best method for certain data conditions is chosen. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…In this paper, an improved method for intrusion detection for binary classification was presented and discussed in detail. …”
Get full text
Get full text
Get full text
Article -
9
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The fuzzy-neural dynamic-bottleneck-detection (FUZZYDBD) is considered as an automatic fuzzy database definition method, would aid in the development of the fuzzy database for the data fuzzification process in FID3-AF. …”
Get full text
Get full text
Get full text
Article -
11
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
13
-
14
A Systematic Review Of Machine Learning Algorithms For Mental Health Detection Using Social Media Data
Published 2026journal::journal article -
15
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…In this data collection method, part of the dataset contains erroneous data, as measurements are always associated with uncertainties. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013“…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013“…Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate.We propose an integrated machine learning algorithm across K-Mean s clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks.K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior,i.e.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Process monitoring and fault detection in nonlinear chemical process based on multi-scale Kernel Fisher discriminant analysis
Published 2015“…This approach is proposed for investigating the potential integration of wavelets and multi-scale methods with discriminant analysis in nonlinear chemical process monitoring and fault detection system. …”
Get full text
Get full text
Conference or Workshop Item -
20
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
Get full text
Get full text
Get full text
Article
