Search Results - (( data detection method algorithm ) OR ( data replication optimization algorithm ))

Refine Results
  1. 1

    Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data by Fanos, Ali Mutar, Pradhan, Biswajeet, Mansor, Shattri, Md Yusoff, Zainuddin, Abdullah, Ahmad Fikri, Jung, Hyung Sup

    Published 2019
    “…The availability of high-resolution laser scanning data and advanced machine learning algorithms has enabled an accurate potential rockfall source identification. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud by Ali Y. Aldailamy, Abdullah Muhammed, Rohaya Latip, Nor Asilah Wati Abdul Hamid, Waidah Ismail

    Published 2024
    Subjects: “…Access latency Cost optimization Data placement Data replication Online algorithm Online social network…”
    journal::journal article
  3. 3
  4. 4

    A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things by Bakhshad, Said, Noor, Rafidah Md, Akhundzada, Adnan, Saba, Tanzila, Ahmedy, Ismail, Haroon, Faisal, Nazir, Babar

    Published 2018
    “…Moreover, it becomes even more challenging in the highly dynamic and distributed environment of the Internet of Things (IoT). Replication is considered a key optimization technique in data grids. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Vigorous replication strategy with balanced quorum for minimizing the storage consumption and response time in cloud environments by Mohd Ali, Fazlina, Latip, Rohaya, Alrshah, Mohamed A., Abdullah, Azizol, Ibrahim, Hamidah

    Published 2021
    “…Essentially, cloud replication must be able to secure huge data by enabling comprehensive replication strategies, optimal data availability, fast data retrieval, and cost-effective data management and maintenance. …”
    Get full text
    Get full text
    Article
  7. 7

    Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS by Fanos, Ali Mutar

    Published 2019
    “…The proposed BANN model achieved the best training accuracies of (95%) and best prediction accuracies of (92%) based on testing data compared to other employed methods. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic replica replacement strategy in data grid by Soosai, Alexis M., Abdullah, Azizol, Othman, Mohamed, Latip, Rohaya, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2012
    “…Data replication strategy is widely adopted for large scale data-intensive applications in distributed network such as data grid. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  15. 15

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables. …”
    Get full text
    Get full text
    Article
  18. 18

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif by Abdalla Osama , Hamdan Abdellatif

    Published 2024
    “…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis