Search Results - (( data distribution methods algorithm ) OR ( data normalization based algorithm ))

Refine Results
  1. 1

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  4. 4

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The AADS algorithm uses evolving methods which are evolving autonomous data partitioning (eADP) and non-weighted frequency equations. …”
    Get full text
    Get full text
    Thesis
  5. 5

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Materials and Methods: NTCP values from BIOPLAN software is calculated based on standard DVH data. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A new variant of black hole algorithm based on multi population and levy flight for clustering problem by Haneen Abdul Wahab, Abdul Raheem

    Published 2020
    “…The first modification is the integration of BH algorithm and levy flight, which result in data clustering method, namely “Levy Flight Black Hole (LBH)”. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Statistical performance of agglomerative hierarchical clustering technique via pairing of correlation-based distances and linkage methods by Nurshaziana, Mohamad Shamsuri

    Published 2025
    “…Five tables of summary for choosing appropriate clustering algorithms according to data distribution were produced. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Anderson-Darling (AD) and Goodness of Fit test is used to identify the best fitted distribution model to the real data. Four traffic distribution which are normal, lognormal, Weibull and exponential distribution are fitted and derived. …”
    Get full text
    Get full text
    Article
  10. 10

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Anderson-Darling (AD) and Goodness of Fit test is used to identify the best fitted distribution model to the real data. Four traffic distribution which are normal, lognormal, Weibull and exponential distribution are fitted and derived. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…We call this method Dynamic Robust Bootstrap-LTS based (DRBLTS) because here we have employed the LTS estimator in the modified bootstrap algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing by Tan, Sek Aun

    Published 2004
    “…Out of the six algorithms derived, Algorithm 6 showed the best correlation with the ground-truth data (R2 value of 0.9755 and RMSE value of 4.0107). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modifying maximum likelihood test for solving singularity and outlier problems in high dimensional cases by Hafeez, Ahmad

    Published 2021
    “…On the other hand, several shortcomings such as inconsistency under normal distribution, based on small sample size with large variables in high dimensions were discovered. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The results of the study indicate that the proposed methods are capable of labelling normal observation and potential outliers in a data set. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of priority oriented scheduling method to increase the efficiency and reliability for automotive job by Nojabaei, Seyedehfarzaneh

    Published 2012
    “…To fulfill this target, first and foremost, the normalize method should be performed. This method allows data (time stamp, time action,priority) of jobs on different scales to be compared by bringing those to a common scale. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic database of robust neural network forecasting / Saadi Ahmad Kamaruddin, Nor Azura Md. Ghani and Norazan Mohamed Ramli by Ahmad Kamaruddin, Saadi, Md. Ghani, Nor Azura, Mohamed Ramli, Norazan

    Published 2014
    “…The backpropagation algorithm is one of the most famous algorithms to train neural network based on the mean square error (MSE) of ordinary least squares (OLS). …”
    Get full text
    Get full text
    Get full text
    Book Section