Search Results - (( based detection method algorithm ) OR ( data replication method algorithm ))
Search alternatives:
- replication method »
- method algorithm »
- based detection »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…Grid search method was adopted to optimise the hyperparameters of the investigated base models. …”
Get full text
Get full text
Get full text
Article -
3
Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS
Published 2019“…The proposed BANN model achieved the best training accuracies of (95%) and best prediction accuracies of (92%) based on testing data compared to other employed methods. …”
Get full text
Get full text
Thesis -
4
Dynamic replication algorithm in data grid: Survey
Published 2008“…For improving the performance of file accesses and to ease the sharing amongst distributed collaboration, such a system needs replication services. Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
5
Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment
Published 2022“…In order to mitigate the issues, ‘cloud data replication’ is commonly implemented for better data performance and promising business continuity. …”
Get full text
Get full text
Thesis -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
7
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
8
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
10
-
11
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
12
-
13
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
14
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
15
-
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
17
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper
