Search Results - data distribution ((((factor algorithm) OR (detection algorithm))) OR (control algorithm))
Search alternatives:
-
1
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
Article -
2
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
3
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
4
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
5
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…Firstly, data collected from available sources as Supervisory Control and Data Acquisition (SCADA). …”
Get full text
Get full text
Thesis -
6
Design and analysis of management platform based on financial big data
Published 2023“…In order to make financial big data generate business value and improve the information application level of financial management, aiming at the high error rate of current financial data classification system, this article adopts the fuzzy clustering algorithm to classify financial data automatically, and adopts the local outlier factor algorithm with neighborhood relation (NLOF) to detect abnormal data. …”
Get full text
Get full text
Get full text
Article -
7
-
8
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…Among many, the ratio algorithm is one of the approaches in remote sensing used to detect chlorophyll-a in the phytoplankton for its distribution and monitoring. …”
Get full text
Get full text
Get full text
Article -
9
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
Get full text
Get full text
Thesis -
10
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm
Published 2016“…Upon this study, a control charging system is needed to control the charging so that the distribution network is not overloaded. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Customized fault management system for low distribution automation system
Published 2008“…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. …”
Get full text
Get full text
Proceeding Paper -
13
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
14
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
15
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…Furthermore, the isolation line is tested on different section and load factor to recognize the improvement of optimal distribution network performance. …”
Get full text
Get full text
Thesis -
16
Power line carrier (PLC) based communication system for distribution automation system
Published 2008“…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…This thesis also aims to solve the low-carbon LIRP model with uncertainty factors such as carbon trading, customer demand, shortages, and soft time windows using advanced algorithms. …”
Get full text
Get full text
Get full text
Thesis -
18
A novel approach to data mining using simplified swarm optimization
Published 2011“…In data mining, data classification and feature selection are considered the two main factors that drive people when making decisions. …”
Get full text
Get full text
Thesis -
19
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
20
Estimation of Transformers Health Index Based on Condition Parameter Factor and Hidden Markov Model
Published 2023Conference Paper
