Search Results - (( from detection system algorithm ) OR ( _ application a algorithm ))

Refine Results
  1. 1

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…The algorithm for bleed detection consist of image processing to separate brain from the skull, rotation and realignment of the brain for mid-sagittal plane determination which used in bleeding detection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A novel algorithm to detect a QPSK signal with the minimum number of samples by Mohammed, Saleh, Hilmi, Sanusi, Abubakar, Adamu, Haruna, Chiroma, Edi, Sutoyo, Mungad, Mu, Tutut, Herawan

    Published 2015
    “…In digital communication the QPSK (quadrature phase-shift keying) signal occupies a special position, from satellite systems through to Local Area Networks (LAN). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…As the network is getting complex and congested, it will become challenging to satisfy the QoS requirements in the MPLS network. This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    Article
  8. 8

    Anomaly detection in ICS datasets with machine learning algorithms by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Abdul Rahman, Farah Diyana, Tahir, Mohammad

    Published 2021
    “…An Intrusion Detection System (IDS) provides a front-line defense mechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a week. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This increases the effect of important malware features selected in the Android application sample. These experiments are conducted on a sample collected from DREBIN dataset. …”
    Get full text
    Article
  11. 11

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone by Saipullah, Khairul Muzzammil

    Published 2013
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Article
  12. 12

    Development of intrusion detection system using residual feedforward neural network algorithm by Rustam, Rushendra, Ramli, Kalamullah, Hayati, Nur, Ihsanto, Eko, Gunawan, Teddy Surya, Halbouni, Asmaa Hani

    Published 2022
    “…An intrusion detection system (IDS) is required to protect data from security threats that infiltrate unwanted information via a regular channel, both during storage and transmission. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  14. 14

    Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing by Tan, Jun You

    Published 2022
    “…YOLOv7 is chosen as the object detection algorithm to detect sun, while Q-learning is chosen as the algorithm for reinforcement learning to control the motors. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Vehicle detection in Intelligent Transportation Systems (ITS) is a key factor ensuring road safety, as it is necessary for the monitoring of vehicle flow, illegal vehicle type detection, incident detection, and vehicle speed estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…In this thesis, we investigate the possibility of adapting an intelligent system to an Intrusion Detection System (IDS) by proposing a cooperative and intelligent detection and prevention system using machine learning approaches, and aim to facilitate the detection and prevention process in a distributed environment. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
    Get full text
    Get full text
    Thesis