Search Results - (( rate detection method algorithm ) OR ( carlo simulation based algorithm ))*

Refine Results
  1. 1

    Subspace Techniques for Brain Signal Enhancement by Kamel , Nidal, Yusoff, Mohd Zuki

    Published 2009
    “…Both the simulation and real human data show that the subspace methods generate reasonably low errors and high success rate. …”
    Get full text
    Get full text
    Book Section
  2. 2

    Characterization of dumping soil and settlement prediction using Monte Carlo approach by Mohd Pauzi, Nur Irfah

    Published 2013
    “…The expected outcome of the research is settlement prediction model of closed dumping area for post-development using Monte Carlo simulation. The predicted settlement by Monte Carlo simulation method could save time and cost. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Application of parallel ensemble Monte Carlo technique in charge dynamics simulation by Umar, Roslan, -, Othman, -, A.P., -, Gopir

    Published 2008
    “…This is due to the fact that, such simulations are costly in terms of computational requirements when implemented on a single processor-based personal computers (PCs). …”
    Get full text
    Get full text
    Article
  4. 4

    Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH by Norhafidzah, Mohd Saad

    Published 2021
    “…For the load modelling studies, the Monte Carlo simulation is performed in Gaussian PDF to develop a probability model of various types of loads. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Application of parallel ensemble Monte Carlo technique in charge dynamics simulation by A. P. Othman, R. Umar, G. Gopir

    Published 2008
    “…In this paper we report the development of a LINUX cluster for the purpose of implementing parallel ensemble Monte Carlo modelling for solid states device. We have proposed the use of Parallel Virtual Machine (PVM) standards when running the parallel algorithm of the ensemble MC simulation. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Simulation of single electron transistor (SET) circuits using Monte Carlo method by Ahmad, Syabani

    Published 2007
    “…The simulator that is used for this project is MOSES version 1.2 (Monte Carlo Single Electron Transistor Simulator) which has been developed by Ruby Chen in Year 1997. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Adsorption of non-ionic surfactants on organoclays in drilling fluid investigated by molecular descriptors and Monte Carlo random walk simulations by Kania, Dina, Yunus, Robiah, Omar, Rozita, Abdul Rashid, Suraya, Mohamed Jan, Badrul, Aulia, Akmal

    Published 2021
    “…Here, the fundamental phenomena involved in non-ionic surfactant adsorption on organoclays and how it affects the rheology of synthetic-based drilling fluids were elucidated by the analysis of molecular descriptors and Monte Carlo simulations. …”
    Get full text
    Get full text
    Article
  9. 9

    Slice sampler algorithm for generalized pareto distribution by Rostami, Mohammad, Adam, Mohd Bakri, Yahya, Mohamed Hisham, Ibrahim, Noor Akma

    Published 2018
    “…Based on the results, the slice sampler algorithm provides closer posterior mean values and shorter 95% quantile based credible intervals compared to the Metropolis-Hastings algorithm. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…The outcome of this simulation based on random sampling from Monte Carlo N-Particle Extended (MCNPX) demonstrated that the calibration map could successfully be implemented in RPT technique to observe the dynamic movement of radioactive particle which represents the tracked media in the quadrilateral bubble column.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…A series of experimental results demonstrate that the proposed method can effectively detect anomalies with low false positive rate, high detection rate and achieve higher detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  18. 18

    On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection by Jia, Liu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…The experimental results demonstrate that the proposed method is better than that of the original ResNet and other existing methods on various metrics, reaching a 98.88% detection rate and 1.11% false alarm rate on the KDDTrain+ dataset…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item