Search Results - (( pattern detection method algorithm ) OR ( variable detection system algorithm ))
Search alternatives:
- variable detection »
- pattern detection »
- method algorithm »
- system algorithm »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
2
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
3
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
5
Video surveillance: explosion detection
Published 2025“…By leveraging three motion-based variables, including motion ratio, new pixel ratio and optical flow values, together with three detection approaches, namely global detection, non-eroded detection and eroded detection, the system demonstrates the effectiveness of motion based methods in detecting explosions at an early stage with acceptable performance. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Final Year Project -
7
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The algorithm enhances the recognition ability of the system compared to manual extraction and labeling of pattern classes. …”
Get full text
Get full text
Thesis -
8
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…In addition, human activity detection methods have wide applications in security, surveillance and postural detection to prevent falls in elderly. …”
Get full text
Get full text
Get full text
Thesis -
9
HEp-2 cell images classification based on statistical texture analysis and fuzzy logic
Published 2014“…This paper proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Conference or Workshop Item -
10
Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm
Published 2015“…In this paper, we first review the advantages and limitations of different diagnostic methods which are currently available to detect FLD. …”
Get full text
Get full text
Get full text
Article -
11
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
12
An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction
Published 2023“…In the third method, a hybrid algorithm called LSTM-C-EST, which is a combination of Fuzzy-MDL and LSTM-C is proposed. …”
Get full text
Get full text
Get full text
Thesis -
13
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…Only one dynamic variable is used as a tuning parameter reducing the complexity of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
Get full text
Get full text
Conference or Workshop Item -
15
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
Get full text
Get full text
Get full text
Thesis -
16
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The stability of the system is ensured through Lyapunov function with the help of backsteping control method. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis
