Search Results - (( data optimization modified algorithm ) OR ( data detection method algorithm ))
Search alternatives:
- optimization modified »
- data optimization »
- method algorithm »
- data detection »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
3
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
4
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
5
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
6
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
7
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
Get full text
Get full text
Thesis -
8
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
9
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
10
Identifying diseases and diagnosis using machine learning
Published 2023“…The method that is use to optimize the criterion efficiency that depend on the previous experience is known as machine learning. …”
Article -
11
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…The frequency domain method of analysis that involves Gardner transformation and conventional inverse filtering often degrades the quality of deconvolved data, leading to inaccurate results, especially for noisy data. …”
Get full text
Get full text
Get full text
Article -
12
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…The second algorithm uses K Nearest Neighbour using a ratio of training data and testing data of 95:05 resulting in an accuracy value of 62%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Power System State Estimation In Large-Scale Networks
Published 2010“…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
14
A Subspace Approach for Extracting Signals Highly Corrupted by Colored Noise
Published 2010“…The simulation results produced by the post-modified SSA2 algorithm, show a higher degree of consistencies in detecting the VEP's P100, P200, and P300 peaks, in comparisons to the pre-modified SSA1 method. …”
Get full text
Get full text
Get full text
Citation Index Journal -
15
Robust techniques for linear regression with multicollinearity and outliers
Published 2016“…The proposed method is formulated by incorporating robust MM-estimator and the modified generalized M-estimator (MGM) in the LRR algorithm. …”
Get full text
Get full text
Thesis -
16
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…Based on CSP behavior, we introduced the Multi Behavior Analysis-based Nomadic People Optimizer method. Every CSP’s trust value is modified based on user feedback over time. …”
Get full text
Get full text
Get full text
Article -
17
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In general, high capacity based methods i.e. LSB substitution, employed the multi-bit-planes for concealing the secret data that eventually modify the cover pixel values and becomes more prominent although human vision are not able to identify those changes. …”
Get full text
Get full text
Get full text
Thesis -
18
Video colorization using canny optimization technique / Irwin Kevin Mueson
Published 2016“…Colorization process will be using the technique of Canny Optimization method. This is a hybrid technique from Colorization using Optimization, which was modified and improved the algorithms by adding Canny Edge Detection to improve the colorization process on the grayscale image or frames. …”
Get full text
Get full text
Thesis -
19
Modelling of cupping suction system based on system identification method
Published 2022“…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period
Published 2023“…This study implemented the preliminary stage of forecasting the COVID-19 data using the proposed SEIRD model and highlighted the importance of parameter optimization. …”
Get full text
Get full text
Get full text
Get full text
Article
