Search Results - (( normal distribution function algorithm ) OR ( variable detection learning algorithm ))
Search alternatives:
- function algorithm »
- variable detection »
- detection learning »
- learning algorithm »
-
1
Pure intelligent monitoring system for steam economizer trips
Published 2023“…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
Conference Paper -
2
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…For this purpose, the normal distributions are applied to each class. The parameters of this distribution are optimized by applying the proposed MOHA. …”
Get full text
Get full text
Thesis -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
4
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
5
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
6
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
7
Robust Kernel Density Function Estimation
Published 2010“…To do this evaluation, the mixtures of bivariate normal distribution with different percentage of contribution are simulated. …”
Get full text
Get full text
Thesis -
8
-
9
Profit-based optimal generation scheduling of a microgrid
Published 2023“…grid). Current methods normally assume either islanded operation, or utilitygrid connected ?…”
Conference paper -
10
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Modeling The Modified Internal Rate Of Return (Mirr) For Long-Term Investment Strategy By The Assumption Of Gamma Distribution
Published 2023“…It offers greater flexibility compared to the commonly used normal distribution.…”
Get full text
Get full text
Thesis -
12
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Article -
13
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Thesis -
14
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Results presents traffic characterizations are identified based on two (2) parameters Cumulative Distribution Functions (CDF) traffic model. Maximum Likelihood Estimator (MLE) technique is used to fit the best distribution model. …”
Get full text
Get full text
Article -
15
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Results presents traffic characterizations are identified based on two (2) parameters Cumulative Distribution Functions (CDF) traffic model. Maximum Likelihood Estimator (MLE) technique is used to fit the best distribution model. …”
Get full text
Get full text
Thesis -
16
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Due to the inherent and uncertain variability of the Harumanis features, fuzzy learning algorithm has been designed to classify these fruits similar to the ability of human experts. …”
Get full text
Get full text
Thesis -
17
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
Get full text
Get full text
Thesis -
18
Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study
Published 2022“…For this reason, this study compares eleven machine learning algorithms to determine which one produces the best accuracy for predicting thyroid risk accurately. …”
Get full text
Get full text
Get full text
Article -
19
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018“…Normalized Ikaz is recommended and advised to be implemented as automatic selection of intrinsic mode function (IMF) through NHHT analysis.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…The PSO inverse technique is then applied to the magnetization curve to construct the magnetic moment distribution. A multimodal normalized log-normal distribution was used in the minimization of the objective function of the PSO inversion technique, and a modification of the PSO search region is proposed to improve the exploration and exploitation of the PSO particles. …”
Get full text
Get full text
Get full text
Article
