Search Results - data distribution ((((factor algorithm) OR (selection algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
3
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
4
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
6
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…The idea was to change the probability distribution over the sequence space. Instead of making purely random selections, the least frequently executed action is selected so that the GUI can be further explored. …”
Get full text
Get full text
Get full text
Thesis -
7
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
Article -
8
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
9
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
10
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
Get full text
Get full text
Thesis -
11
Design and analysis of management platform based on financial big data
Published 2023“…In order to make financial big data generate business value and improve the information application level of financial management, aiming at the high error rate of current financial data classification system, this article adopts the fuzzy clustering algorithm to classify financial data automatically, and adopts the local outlier factor algorithm with neighborhood relation (NLOF) to detect abnormal data. …”
Get full text
Get full text
Get full text
Article -
12
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
13
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…Among many, the ratio algorithm is one of the approaches in remote sensing used to detect chlorophyll-a in the phytoplankton for its distribution and monitoring. …”
Get full text
Get full text
Get full text
Article -
14
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
Get full text
Get full text
Thesis -
15
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article -
16
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
17
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The overall software design is divided into three modules which are Image Acquisition, Image Processing and Object Detection, and Data Transmission module. The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
18
A novel approach to data mining using simplified swarm optimization
Published 2011“…In data mining, data classification and feature selection are considered the two main factors that drive people when making decisions. …”
Get full text
Get full text
Thesis -
19
Development Of Fall Risk Clustering Algorithm In Older People
Published 2020“…The proposed algorithm consists of several stages, includes data pre-processing, feature selection, feature extraction, clustering and characteristic interpretation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article
