Search Results - data distribution ((((factor algorithm) OR (detection algorithm))) OR (control algorithm))

Refine Results
  1. 1

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
    Article
  2. 2

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  4. 4

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  5. 5

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…Firstly, data collected from available sources as Supervisory Control and Data Acquisition (SCADA). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design and analysis of management platform based on financial big data by Chen, Yuhua, Mustafa, Hasri, Zhang, Xuandong, Liu, Jing

    Published 2023
    “…In order to make financial big data generate business value and improve the information application level of financial management, aiming at the high error rate of current financial data classification system, this article adopts the fuzzy clustering algorithm to classify financial data automatically, and adopts the local outlier factor algorithm with neighborhood relation (NLOF) to detect abnormal data. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm by Lee, Clement Yuon Sien

    Published 2016
    “…Upon this study, a control charging system is needed to control the charging so that the distribution network is not overloaded. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Customized fault management system for low distribution automation system by Ahmed, Musse Mohamud, Soo, W. L.

    Published 2008
    “…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. …”
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  14. 14

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  15. 15

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Furthermore, the isolation line is tested on different section and load factor to recognize the improvement of optimal distribution network performance. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Power line carrier (PLC) based communication system for distribution automation system by Musse, Mohamud Ahmed, Soo, W. L.

    Published 2008
    “…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…This thesis also aims to solve the low-carbon LIRP model with uncertainty factors such as carbon trading, customer demand, shortages, and soft time windows using advanced algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A novel approach to data mining using simplified swarm optimization by Wahid, Noorhaniza

    Published 2011
    “…In data mining, data classification and feature selection are considered the two main factors that drive people when making decisions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller by Aladaileh, Mohammad Adnan Ahmad

    Published 2021
    “…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
    Get full text
    Get full text
    Thesis
  20. 20