Search Results - (( data detection method algorithm ) OR ( variable generation using algorithm ))
Search alternatives:
- variable generation »
- method algorithm »
- generation using »
- using algorithm »
- data detection »
-
1
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
Get full text
Get full text
Article -
4
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
5
Fault detection and diagnosis using correlation coefficients
Published 2005“…Faults considered in the research are sensor faults, valve faults and controller faults generated in the fault data (OC). Shewhart Control Chart and Range Control Chart together with the developed correlation coefficients are used for fault detection and diagnosis. …”
Get full text
Get full text
Thesis -
6
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
7
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…Two back-propagation training algorithms, namely the Levenberg–Marquardt and Bayesian regularization algorithms, and the k-fold cross-validation technique, were employed to train the optimal networks using a training data set. …”
Get full text
Get full text
Article -
8
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…Furthermore, to confirm the performances of the proposed multi-sensor fusion methods using challenging motion sensor data generated using smartphones and wearable sensors. …”
Get full text
Get full text
Get full text
Thesis -
9
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
Get full text
Get full text
Thesis -
10
A peer-to-peer blockchain based interconnected power system
Published 2021“…So, the best practice method should be used to resolve the harmonics issue. …”
Get full text
Get full text
Get full text
Article -
11
Development of new code for optical code division multiple access systems
Published 2011“…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
Get full text
Thesis -
12
Improved robust estimator and clustering procedures for multivariate outliers detection
Published 2023“…One of the methods to detect outliers in multivariate data is by using distance-based methods, which is Mahalanobis distance (MD). …”
Get full text
Get full text
Thesis -
13
Modeling of cupping suction system based on system identification method
Published 2022“…The input and output data were used to create this modeling output variable of the cupping suction system is detected by connecting a differential pressure sensor to the cup, while the input variable is determined by the speed of the pump applied in various locations. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW
Published 1996“…Also, it was found that scanning of a certain region of the captured image in front of the weld puddle decreases the data processing time drastically. In continuation of this work, a cascade control system for control of welding velocity as well as an algorithm for off·line generation and control of weld 3-D trajectory was developed.…”
Get full text
Get full text
Thesis -
15
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…A generated data where the failure times are taken as exponentially distributed are used to further compare these two parametric models. …”
Get full text
Get full text
Thesis -
16
Advanced neural networking and classification techniques for human brain tissues diagnoses: segmenting healthy, cancer affected and edema brain tissues
Published 2019“…Especially, in this work MRI images are used to diagnose tumor in the brain. However, the huge amount of data generated by MRI scan thwarts manual classification of tumor vs non-tumor in a particular time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
18
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis
