Search Results - (( data detection method algorithm ) OR ( parameter evaluation system algorithm ))
Search alternatives:
- parameter evaluation »
- evaluation system »
- method algorithm »
- system algorithm »
- data detection »
-
1
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
2
Power System State Estimation In Large-Scale Networks
Published 2010“…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
3
Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim
Published 2016“…GA is used as the method of unlawful behavior detection. Previous research on GA components impact evaluation has identified selection parameter as high potential of increasing GA performance for unlawful behavior detection. …”
Get full text
Get full text
Thesis -
4
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…The performance of our algorithm was evaluated using data obtained from two different sources: (i) our own data collected from 19 healthy subjects using the wearable Sotera Visi Mobile system (Sotera Wireless Inc.) as they performed various movement types; and (ii) ICU data provided by the PhysioNet MIMIC II database. …”
Get full text
Get full text
Article -
5
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…This MLFNN with BP algorithm was simulated using MATLAB software. The performance of this classifier was evaluated based on three parameters: accuracy, sensitivity, and False Positive Rate (FPR). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…In the first step, all possible detection parameters/ signals which can be affected by islanding occurrence in the system are measured locally for islanding and non-islanding conditions. …”
Get full text
Get full text
Thesis -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi
Published 2005“…The useful features of information that was extracted from the handwritten character images are the edges of the character using Sobel Edge Detection Method. As a result of this project, it is proven that the backpropagation algorithm can be used for recognizing handwritten characters and recognition tasks depends highly on how the data was preprocessed and the network parameter itself.…”
Get full text
Get full text
Thesis -
9
-
10
Analysis of WiMAX Positioning Using Received- Signal-Strength Method
Published 2013“…Selection of perfect model that resemble the real environment will led to better wireless positioning system. By the performance evaluation, the user can plan better simulation system and can create more accurate algorithms for radio positioning.…”
Get full text
Get full text
Get full text
Article -
11
Hybrid vehicle engine misfire detection using Piezo-film Sensors and analysing with Z-freq / Nor Azazi Ngatiman and Mohd Zaki Nuawi
Published 2018“…While the second phase is signal measurement using data acquisition, filtering and analysis using Z-freq method. …”
Get full text
Get full text
Article -
12
Detection of sweetness level for fruits (watermelon) with machine learning
Published 2020“…Thus, the image processing has widely been used for identification, detection, grading and quality evaluation in the agricultural field. The objective of this work is to investigate the sweetness parameter for the fruit’s detection and classification algorithm in machine learnings. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
Get full text
Get full text
Thesis -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
15
Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis
Published 2011“…The synthetic reaction was optimized by Taguchi method based on orthogonal array to evaluate the effect of each parameters and interactive effects of reaction parameters including temperature, time, amount of enzyme, amount of molecular sieve, amount of solvent, and molar ratio of substrates (xylitol: fatty acid). …”
Get full text
Get full text
Thesis -
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
17
Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm
Published 2018“…At the early stage of this disease, infected palms are symptomless, which imposes difficulties in detecting the disease. In spite of the availability of tissue and DNA sampling techniques, there is a particular need for replacing costly field data collection methods for detecting Ganoderma in its early stage. …”
Get full text
Get full text
Get full text
Thesis -
18
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis
