Search Results - (( normal detection method algorithm ) OR ( variable extractions method algorithm ))
Search alternatives:
- extractions method »
- normal detection »
- method algorithm »
- variable »
-
1
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…The results of three experiments demonstrate that our algorithm substantially outperforms all previous methods. …”
Get full text
Get full text
Article -
2
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Thus, IADS is a better solution for anomaly detection methods in detecting untrustworthy behaviour and to define attack and normal behaviours more accurately.…”
Get full text
Get full text
Thesis -
3
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
4
Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques
Published 2025“…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
Get full text
Get full text
Monograph -
5
Computer-aided diagnosis of diabetic subjects by heart rate variability signals using discrete wavelet transform method
Published 2015“…These features are ranked by using various ranking methods, namely, Bhattacharyya space algorithm, t-test, Wilcoxon test, Receiver Operating Curve (ROC) and entropy. …”
Get full text
Get full text
Get full text
Article -
6
Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm
Published 2015“…In this paper, we first review the advantages and limitations of different diagnostic methods which are currently available to detect FLD. …”
Get full text
Get full text
Get full text
Article -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
9
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…This research introduces Adaptive Grid-Meshed-Buffer Stream Clustering Algorithm (AGMB), that addresses these weaknesses and improves outlier detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
12
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
13
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The User Profile Filter (UPF) was proposed to aid the SVM algorithm to classify the captured traffics into normal and abnormal behavior. …”
Get full text
Get full text
Get full text
Thesis -
14
A clustering-based method for outlier detection under concept drift
Published 2024“…Anomaly-based strategies, diverging from traditional signature-based methods, gain popularity for their effectiveness in detecting new attacks. …”
Get full text
Get full text
Get full text
Article -
15
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
16
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To find the proper detection threshold a series of tests on different scenarios of normal and attack traffic were conducted. …”
Get full text
Get full text
Thesis -
17
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
Get full text
Get full text
Article -
18
Glove defect detection using image processing / Farid Zuhri Kamal
Published 2020“…Glove defect detection using image processing is a convenient method to identify failure in glove production industry. …”
Get full text
Get full text
Thesis -
19
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…The results of our experiments have demonstrated a significant improvement in inefficient network intrusion detection over other classification methods.…”
Get full text
Get full text
Get full text
Article -
20
Integrated face detection approach for far image application
Published 2016“…The noise reduction method in the proposed algorithm consists of a combination of a morphological filter and a rejection method. …”
Get full text
Get full text
Thesis
