Search Results - (( data detection system algorithm ) OR ( parameter evaluation method algorithm ))
Search alternatives:
- parameter evaluation »
- system algorithm »
- method algorithm »
- data detection »
-
1
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
2
Power System State Estimation In Large-Scale Networks
Published 2010“…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
3
Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim
Published 2016“…GA is used as the method of unlawful behavior detection. Previous research on GA components impact evaluation has identified selection parameter as high potential of increasing GA performance for unlawful behavior detection. …”
Get full text
Get full text
Thesis -
4
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…The performance of our algorithm was evaluated using data obtained from two different sources: (i) our own data collected from 19 healthy subjects using the wearable Sotera Visi Mobile system (Sotera Wireless Inc.) as they performed various movement types; and (ii) ICU data provided by the PhysioNet MIMIC II database. …”
Get full text
Get full text
Article -
5
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…This MLFNN with BP algorithm was simulated using MATLAB software. The performance of this classifier was evaluated based on three parameters: accuracy, sensitivity, and False Positive Rate (FPR). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…In the first step, all possible detection parameters/ signals which can be affected by islanding occurrence in the system are measured locally for islanding and non-islanding conditions. …”
Get full text
Get full text
Thesis -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi
Published 2005“…As a result of this project, it is proven that the backpropagation algorithm can be used for recognizing handwritten characters and recognition tasks depends highly on how the data was preprocessed and the network parameter itself.…”
Get full text
Get full text
Thesis -
9
-
10
Analysis of WiMAX Positioning Using Received- Signal-Strength Method
Published 2013“…Selection of perfect model that resemble the real environment will led to better wireless positioning system. By the performance evaluation, the user can plan better simulation system and can create more accurate algorithms for radio positioning.…”
Get full text
Get full text
Get full text
Article -
11
Hybrid vehicle engine misfire detection using Piezo-film Sensors and analysing with Z-freq / Nor Azazi Ngatiman and Mohd Zaki Nuawi
Published 2018“…While the second phase is signal measurement using data acquisition, filtering and analysis using Z-freq method. …”
Get full text
Get full text
Article -
12
Detection of sweetness level for fruits (watermelon) with machine learning
Published 2020“…Thus, the image processing has widely been used for identification, detection, grading and quality evaluation in the agricultural field. The objective of this work is to investigate the sweetness parameter for the fruit’s detection and classification algorithm in machine learnings. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
Get full text
Get full text
Thesis -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
15
Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis
Published 2011“…The synthetic reaction was optimized by Taguchi method based on orthogonal array to evaluate the effect of each parameters and interactive effects of reaction parameters including temperature, time, amount of enzyme, amount of molecular sieve, amount of solvent, and molar ratio of substrates (xylitol: fatty acid). …”
Get full text
Get full text
Thesis -
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
17
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
18
Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm
Published 2018“…At the early stage of this disease, infected palms are symptomless, which imposes difficulties in detecting the disease. In spite of the availability of tissue and DNA sampling techniques, there is a particular need for replacing costly field data collection methods for detecting Ganoderma in its early stage. …”
Get full text
Get full text
Get full text
Thesis -
19
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…This detection system must differentiate between normal data and abnormal or hacker-generated data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
