Search Results - (( rate detection ((sensor algorithm) OR (mead algorithm)) ) OR ( _ simulation based algorithm ))

Refine Results
  1. 1

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Smart fall detection by enhanced SVM with fuzzy logic membership function by Harum, Norharyati, Khalil, Mohamad Kchouri, Hazimeh, Hussein, Obeid, Ali

    Published 2023
    “…So far, the most widely used fall prediction methods collect data from inertial measurement unit (IMU) sensors. In addition, they use thresholds to identify falls based on artificial experiences or machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Modelling of intelligent intrusion detection system: making a case for snort by Olanrewaju, Rashidah Funke, Ku zahir, Ku Nor Afiza, Asnawi, Ani Liza, Sanni, Mistura Laide, Ahmed, Abdulkadir Adekunle

    Published 2018
    “…The data collected was used to train the Multilayer Feedforward Neural Network (MLFNN) with Back-propagation (BP) algorithm. This MLFNN with BP algorithm was simulated using MATLAB software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Development of physiological mouse for anxiety disorder identification system by Mohd Noh, Faridah Hanim, Wan Kamri, Wan Mohd Amin Khalili, Zakaria, Ahmad Hawari, Gimin, Nor Arina, Iqbal, Safa'at, Yaakub, Muhamad Faizal, Mohd Shah, Nor Shahida, Mashori, Sumaiya

    Published 2023
    “…The detection is being processed based on the measured physiological data that being quantified via the embedded sensors in the mouse circuits. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. …”
    Get full text
    Get full text
    Article
  9. 9

    Efficient node cooperation stimulation mechanism in wireless multihop networks by Samian, Normalia

    Published 2017
    “…Assisted by an efficient cross-checking algorithm on several cheating and colluding cases, TFE mechanism is able to reduce the number of cheating nodes over time and the rate of illegitimate collusion as proven in the simulation results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…The aim of this study is to propose an innovative multi-sensor fusion framework to improve human activity detection performances and reduce misrecognition rate. …”
    Get full text
    Get full text
    Article
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  14. 14
  15. 15
  16. 16

    Forward scattering radar for real-time detection of human activities and fall classification by Abdulhameed, Ali Ahmed

    Published 2019
    “…They also provide advantages of a very low false alarm rate, and preserving personal privacy. The purpose of using radar is to detect, identify and recognize the moving targets based on the Doppler phenomenon generated from the interaction of the transmitting electromagnetic waves with the moving parts of the target. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Obstacle detection for Unmanned Aerial Vehicle (UAV) by Abdul Khaliq, Nor Aizatul Nabila, Ramli, Muhammad Faiz

    Published 2022
    “…In real-time experiment, the success rate for good texture (40%), poor texture (55%) and texture-less (45%) The findings indicate that the recommended method works well for detecting textures-less obstacle even though the success rate is only 40% because out of 10 test only one test is fail on detecting free region. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM by LO , TIMOTHY YIN HONG

    Published 2019
    “…The effect of video quality on human detection rate is discussed in Chapter 4. In a human detection, the software is represented by algorithms, in which algorithm also being used in the process of training the dataset. …”
    Get full text
    Get full text
    Final Year Project
  20. 20