Search Results - (( parameters variation means algorithm ) OR ( based detection system algorithm ))*

Refine Results
  1. 1

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…A good face detection system would take care of most of these processes. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…Other system parameter variations are 4 different fault resistances (0.001 Ω, 10 Ω, 50 Ω, 100 Ω), and two inception angles (0 oC and 30 oC). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A proposed variable parameter control chart for monitoring the multivariate coefficient of variation by Chew, X. Y., Khoo, B. C., Khaw, K. W., Yeong, W. C. *, Chong, Z. L.

    Published 2019
    “…In certain processes where the process mean and variance are not independent of one another, the coefficient of variation (CV), which measures the ratio of the standard deviation to the mean, should be monitored. …”
    Get full text
    Get full text
    Article
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Design of efficient, accurate, and low complexity intrusion detection system is a challenging task. Intrusion detection method is a core of intrusion detection system and it can be either signature based or anomaly based. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula by Francis Xavier, Sam Daniel

    Published 2020
    “…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Urban green space spatio-temporal change influences on land surface temperature in Kuala Lumpur, Malaysia by Abu Kasim, Junainah

    Published 2020
    “…The study also applied land surface emissivity (LSE) algorithm to determine the LST value extracted from the Band 10 parameter of Landsat 8 OLI/TIRS. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Embedded system based driver drowsiness detection system by Islam S.Z., Mohd Ali M.A., Bin Jidin R., Islam S.Z.

    Published 2023
    “…This paper presents a System-on-Chip (SoC) visual-based driver drowsiness detection system. …”
    Conference paper
  16. 16

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    Article