Search Results - (( motion estimation clustering algorithm ) OR ( normal distribution _ algorithm ))*

Search alternatives:

Refine Results
  1. 1

    Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security by Pitafi, S., Anwar, T., Dewa Made Widia, I., Yimwadsana, B.

    Published 2023
    “…To solve the above problem, we designed a prototype for PIDS using a DHT22 temperature and humidity sensor, vibration sensor SW- 420 Module Pinout, Mini PIR motion sensor, and Arduino UNO. After collecting the data from above mentioned sensors we applied machine learning algorithms DBSCAN to cluster the data points and K-NN classification to classify those clusters in one-dimensional data, but the results were not much satisfying. …”
    Get full text
    Get full text
    Article
  2. 2

    Improved performance in distributed estimation by convex combination of DNSAF and DNLMS algorithms by Ahmad Pouradabi, Amir Rastegarnia, Azam Khalili, Ali Farzamnia

    Published 2022
    “…Diffusion normalized least mean square (DNLMS) algorithm has low misadjustment error, but it is slow in convergence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  3. 3

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Coherent crowd analysis with visual attributes / Nurul Japar by Nurul , Japar

    Published 2022
    “…It also computes the similarity and merges local clusters into global clusters for collectiveness detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel distributed genetic algorithm development based on microcontrollers framework by Krishnan P.S., Kiong T.S., Koh J.

    Published 2023
    “…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
    Conference paper
  7. 7

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Article
  8. 8

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…This thesis work studied on digital image encryption algorithms performed towards JPEG images. With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  10. 10

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Optimum capacitor placement and sizing for distribution system based on an improved voltage stability index by Aman, M.M., Jasmon, G.B., Bakar, A.H.A., Mokhlis, Hazlie

    Published 2012
    “…The proposed algorithm is tested on 12-bus, 33-bus and 69-bus radial distribution networks. …”
    Get full text
    Get full text
    Article
  12. 12

    Broken Conductor Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2013
    “…The effect of capacitor bank switching, non-linear load current, no-load line switching and other normal event on distribution feeder harmonics is discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    High Impedance Fault Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2012
    “…HIF and other operation event data were obtained by simulation of a 13.8 kV distribution feeder using PSCAD. The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…Directional statistics is a branch of statistics which deal with the data in angle form in which the method of analysis is different from linear data. For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Parallel distributed computational microcontroller system for adaptive antenna downlink transmitter power optimization by Sankar K.P., Tiong S.K., Koh S.P.J.

    Published 2023
    “…Parallel Distributed Genetic Algorithm (PDGA) is employed in adaptive beam forming technique to reduce power usage of adaptive antenna at WCDMA base station. …”
    Article
  16. 16

    The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool by Stapa @ Mustapa, Muhamad Azhar

    Published 2008
    “…The goal of this project is to test on tardiness parameter in local search based algorithms. A good scheduling algorithm normally shows lower value of total tardiness and schedule time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Statistical approach on grading: mixture modeling by Md. Desa, Zairul Nor Deana

    Published 2006
    “…In the conditional Bayesian model, we assume the data to follow the Normal Mixture distribution where the grades are distinctively separated by the parameters: means and proportions of the Normal Mixture distribution. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model by Sulaiman , Marizan, Adnan, Tawafan, Ibrahim, Zulkifilie

    Published 2013
    “…The effect of capacitor bank switching, non-linear load current, no-load line switching and other normal event on distribution feeder harmonics is discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Anderson-Darling (AD) and Goodness of Fit test is used to identify the best fitted distribution model to the real data. Four traffic distribution which are normal, lognormal, Weibull and exponential distribution are fitted and derived. …”
    Get full text
    Get full text
    Article
  20. 20

    Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering by Rosbi, Sofian, Abu Bakar, Nashirah

    Published 2017
    “…Graphical method indicates the first difference of data distribution is a non-normal distribution. Then, Shapiro-Wilk statistical test confirmed that first difference of data distribution deviate from normal distribution. …”
    Get full text
    Get full text
    Get full text
    Article