Search Results - (( data normalization based algorithm ) OR ( data selection methods algorithm ))
Search alternatives:
- normalization based »
- data normalization »
- selection methods »
- methods algorithm »
- data selection »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
2
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
4
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
5
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Robust variable selection methods for large- scale data in the presence of multicollinearity, autocorrelated errors and outliers
Published 2016“…We develop Robust Forward Selection algorithm based on RFCH correlation coefficient (RFS.RFCH) because FS.Winso is not robust to multivariate outliers. …”
Get full text
Get full text
Thesis -
7
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…Thus, in this thesis, a new Smart Energy Meter (SEM) with adaptive data transfer algorithm is designed to accommodate the problem. …”
Get full text
Get full text
Thesis -
8
The new efficient and accurate attribute-oriented clustering algorithms for categorical data
Published 2012“…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
Get full text
Get full text
Thesis -
9
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
10
-
11
Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image
Published 2016“…Three feature selection algorithms of Genetic Algorithm (GA), Support Vector Machine (SVM) and Random Forest (RF) were used to select the most significant wavelengths since the algorithms works well with large size of data and widely applied for feature selection of hyperspectral remote sensing data. …”
Get full text
Get full text
Thesis -
12
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
13
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
14
-
15
Feature fusion using a modified genetic algorithm for face and signature recognition system
Published 2015“…Several approaches and benchmark data were used to validate the effectiveness of the proposed method compared to the unimodal system and normal feature selection method. …”
Get full text
Get full text
Thesis -
16
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The proposed model is tested for small and large size grid data, integrated with photovoltaic sources under normal and fluctuating load demand conditions and seasonal variations. …”
Get full text
Get full text
Thesis -
17
Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing
Published 2004“…Out of the six algorithms derived, Algorithm 6 showed the best correlation with the ground-truth data (R2 value of 0.9755 and RMSE value of 4.0107). …”
Get full text
Get full text
Thesis -
18
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…The proposed method is compared with three established conventional Linear Least Squares (LLS) solution methods : Normal Equation (NE), QR factorization (QR) and Singular Value Decomposition (SVD). …”
Get full text
Get full text
Thesis -
19
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Thesis -
20
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Undergraduates Project Papers
