Search Results - (( data distribution methods algorithm ) OR ( data normalization based algorithm ))
Search alternatives:
- distribution methods »
- normalization based »
- data normalization »
- data distribution »
- methods algorithm »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
2
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
Get full text
Get full text
Thesis -
3
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
4
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…The AADS algorithm uses evolving methods which are evolving autonomous data partitioning (eADP) and non-weighted frequency equations. …”
Get full text
Get full text
Thesis -
5
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Materials and Methods: NTCP values from BIOPLAN software is calculated based on standard DVH data. …”
Get full text
Get full text
Monograph -
6
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
7
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…The first modification is the integration of BH algorithm and levy flight, which result in data clustering method, namely “Levy Flight Black Hole (LBH)”. …”
Get full text
Get full text
Thesis -
8
Statistical performance of agglomerative hierarchical clustering technique via pairing of correlation-based distances and linkage methods
Published 2025“…Five tables of summary for choosing appropriate clustering algorithms according to data distribution were produced. …”
Get full text
Get full text
Get full text
Thesis -
9
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Anderson-Darling (AD) and Goodness of Fit test is used to identify the best fitted distribution model to the real data. Four traffic distribution which are normal, lognormal, Weibull and exponential distribution are fitted and derived. …”
Get full text
Get full text
Article -
10
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Anderson-Darling (AD) and Goodness of Fit test is used to identify the best fitted distribution model to the real data. Four traffic distribution which are normal, lognormal, Weibull and exponential distribution are fitted and derived. …”
Get full text
Get full text
Thesis -
11
Dynamic robust bootstrap method based on LTS estimators
Published 2009“…We call this method Dynamic Robust Bootstrap-LTS based (DRBLTS) because here we have employed the LTS estimator in the modified bootstrap algorithm. …”
Get full text
Get full text
Article -
12
Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing
Published 2004“…Out of the six algorithms derived, Algorithm 6 showed the best correlation with the ground-truth data (R2 value of 0.9755 and RMSE value of 4.0107). …”
Get full text
Get full text
Thesis -
13
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
14
Modifying maximum likelihood test for solving singularity and outlier problems in high dimensional cases
Published 2021“…On the other hand, several shortcomings such as inconsistency under normal distribution, based on small sample size with large variables in high dimensions were discovered. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
16
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
17
Robust Kernel Density Function Estimation
Published 2010“…The results of the study indicate that the proposed methods are capable of labelling normal observation and potential outliers in a data set. …”
Get full text
Get full text
Thesis -
18
Fault detection and diagnosis using correlation coefficients
Published 2005“…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
Get full text
Get full text
Thesis -
19
Development of priority oriented scheduling method to increase the efficiency and reliability for automotive job
Published 2012“…To fulfill this target, first and foremost, the normalize method should be performed. This method allows data (time stamp, time action,priority) of jobs on different scales to be compared by bringing those to a common scale. …”
Get full text
Get full text
Thesis -
20
Automatic database of robust neural network forecasting / Saadi Ahmad Kamaruddin, Nor Azura Md. Ghani and Norazan Mohamed Ramli
Published 2014“…The backpropagation algorithm is one of the most famous algorithms to train neural network based on the mean square error (MSE) of ordinary least squares (OLS). …”
Get full text
Get full text
Get full text
Book Section
