Search Results - (( normal detection method algorithm ) OR ( variable extraction method algorithm ))

Refine Results
  1. 1

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…The results of three experiments demonstrate that our algorithm substantially outperforms all previous methods. …”
    Get full text
    Get full text
    Article
  2. 2

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Thus, IADS is a better solution for anomaly detection methods in detecting untrustworthy behaviour and to define attack and normal behaviours more accurately.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
    Get full text
    Get full text
    Article
  4. 4

    Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques by Sharuddin, Nur Amirah Atikah

    Published 2025
    “…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Computer-aided diagnosis of diabetic subjects by heart rate variability signals using discrete wavelet transform method by Acharya, U.R., Sudarshan, V.K., Ghista, D.N., Lim, W.J.E., Molinari, F., Sankaranarayanan, M.

    Published 2015
    “…These features are ranked by using various ranking methods, namely, Bhattacharyya space algorithm, t-test, Wilcoxon test, Receiver Operating Curve (ROC) and entropy. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm by Acharya, U.R., Faust, O., Molinari, F., Sree, S.V., Junnarkar, S.P., Sudarshan, V.

    Published 2015
    “…In this paper, we first review the advantages and limitations of different diagnostic methods which are currently available to detect FLD. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  9. 9

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…This research introduces Adaptive Grid-Meshed-Buffer Stream Clustering Algorithm (AGMB), that addresses these weaknesses and improves outlier detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  12. 12

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The User Profile Filter (UPF) was proposed to aid the SVM algorithm to classify the captured traffics into normal and abnormal behavior. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A clustering-based method for outlier detection under concept drift by Tahir, Mahjabeen, Abdullah, Azizol, Udzir, Nur Izura, Kasmiran, Khairul Azhar

    Published 2024
    “…Anomaly-based strategies, diverging from traditional signature-based methods, gain popularity for their effectiveness in detecting new attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To find the proper detection threshold a series of tests on different scenarios of normal and attack traffic were conducted. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
    Get full text
    Get full text
    Article
  18. 18

    Glove defect detection using image processing / Farid Zuhri Kamal by Kamal, Farid Zuhri

    Published 2020
    “…Glove defect detection using image processing is a convenient method to identify failure in glove production industry. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…The results of our experiments have demonstrated a significant improvement in inefficient network intrusion detection over other classification methods.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…The noise reduction method in the proposed algorithm consists of a combination of a morphological filter and a rejection method. …”
    Get full text
    Get full text
    Thesis