Search Results - a distribution ((((factor algorithm) OR (selection algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
3
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
4
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
Published 2014“…The selected algorithms were then applied in a distributed fashion at each node. …”
Get full text
Get full text
Get full text
Article -
5
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
6
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article -
7
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Automated surveillance in distributed, wireless visual networks: a comparative study
Published 2013“…This paper demonstrates the applicability of a selection of such algorithms to a distributed network of wireless visual sensors. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography
Published 2020“…It is crucial to select a suitable relaxation factor in iterative image reconstruction algorithms (e.g. …”
Get full text
Get full text
Article -
11
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
13
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…Among many, the ratio algorithm is one of the approaches in remote sensing used to detect chlorophyll-a in the phytoplankton for its distribution and monitoring. …”
Get full text
Get full text
Get full text
Article -
14
Evaluation of boruta algorithm in DDoS detection
Published 2023“…As traffic grows over time, detecting a Distributed Denial of Service (DDoS) assault is a challenging task. …”
Get full text
Get full text
Get full text
Article -
15
Model-based hybrid variational level set method applied to object detection in grey scale images
Published 2024“…In industrial inspection, segmentation algorithms detect product defects, cracks, or anomalies for quality control and safety. …”
Get full text
Get full text
Thesis -
16
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…SVM is a classification technique developed by Vapnik [1] but a practical difficulty of using SVM is the selection of parameters such as C and kernel parameter, � in Gaussian RBF kernel. …”
Conference Paper -
17
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article -
18
Fault section detection and location on distribution network using analytical voltage sags database
Published 2006“…This paper presents the application of voltage sags information for automatic fault section detection and location on a distribution network. Based on a network topology and load estimations obtained from load modeling, this method uses a three phase load flow and fault analysis to establish analytical voltage sags database information for a studied distribution network. …”
Get full text
Get full text
Conference or Workshop Item -
19
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
Get full text
Get full text
Thesis -
20
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The increasing affordability of powerful processors and memory chips, availability of real-time operating systems, low complexity intelligent algorithms and the coming-of-age of system development software are the key factor that makes this development possible. …”
Get full text
Thesis
