Search Results - (( rate detection model algorithm ) OR ( wave optimization _ algorithm ))*
Search alternatives:
- wave optimization »
- detection model »
- model algorithm »
- rate detection »
-
1
Development of a State-Space Observer for Active Noise Control Systems
Published 2009“…The secondary path of the ANC system is modeled by using the LMS algorithm to complete the design of the Filtered-X Least Mean Square (FXLMS) controller. …”
Get full text
Get full text
Thesis -
2
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…Besides that, a comparison is made with Cumulative Sum, Exponentially-weighted Moving Average, and Multi Layer Perceptron.From the experiment, the best parameter setting for anthrax outbreak using dendrite cell algorithm is identified whereby it proven can helps the model to produce a good detection result between detection rate and false alarm rate.Since each outbreak disease carries different outbreak characteristic, the parameter setting for different outbreak might be different.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Inversion Of Surface Wave Phase Velocity Using New Genetic Algorithm Technique For Geotechnical Site Investigation
Published 2011“…Therefore the use of genetic algorithm (GA) optimization technique which is one of nonlinear optimization methods is an appropriate choice to solve surface wave inversion problem having high nonlinearity and multimodality. …”
Get full text
Get full text
Thesis -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
5
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
6
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
Get full text
Get full text
Conference or Workshop Item -
7
Machine learning algorithms in context of intrusion detection
Published 2016“…These machine learning algorithms develop a detection model in a training phase. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
10
Optimizing the efficiency of Oscillating Water Column (OWC) wave energy converter using genetic algorithm
Published 2015“…This paper, describes a method to maximize the pneumatic system efficiency using optimization technique based on Genetic algorithm. This method involves an extraction of maximum incident wave energy corresponding to the wave height, determining of the best deep water length and maximizing the applied damping ratio which can lead to an increase in the pneumatic system efficiency. …”
Get full text
Get full text
Article -
11
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
12
Outbreak detection model based on danger theory
Published 2014“…Two outbreak diseases, dengue and SARS, are subjected to a danger theory algorithm; namely the dendritic cell algorithm.To evaluate the model, four measurement metrics are applied: detection rate, specificity, false alarm rate, and accuracy. …”
Get full text
Get full text
Article -
13
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G
Published 2021“…In the alternating minimization algorithms, low complexity is proposed by enforcing an orthogonal constraint on the digital precoders to realize the joint optimization of computational complexity and communication power. …”
Get full text
Get full text
Article -
15
Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G
Published 2021“…In the alternating minimization algorithms, low complexity is proposed by enforcing an orthogonal constraint on the digital precoders to realize the joint optimization of computational complexity and communication power. …”
Get full text
Get full text
Article -
16
Pipeline scour rates prediction-based model utilizing a multilayer perceptron-colliding body algorithm
Published 2023“…Forecasting; Multilayers; Particle swarm optimization (PSO); Pipelines; Soft computing; Colliding bodies; MLP model; Multi layer perceptron; Optimization algorithms; Optimization modeling; Prediction model; Soft computing models; Wave characteristics; Scour; algorithm; hydrological modeling; model; optimization; pipeline; scour; Cetacea…”
Article -
17
Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model
Published 2021“…In the proposed diagnostic model, a water wave optimization (WWO) algorithm was implemented for improving the diagnosis accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Improved Switching-Basedmedian Filter For Impulse Noise Removal
Published 2013“…Next, in the noise detection stage, in addition to the originally proposed intensity distance differential approach, the new method includes intensity height differential approach to reduce false detection rate. …”
Get full text
Get full text
Thesis -
19
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
20
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…However, the problem of improving the accuracy and efficiency of classification models remains open and yet to be resolved. This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article
