Search Results - (( data detection method algorithm ) OR ( using simulation learning algorithm ))
Search alternatives:
- simulation learning »
- learning algorithm »
- method algorithm »
- data detection »
-
1
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
3
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
4
Recursive linear network modeling for detecting gas leak
Published 2010“…Relative mass loss of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
5
Enhancement of network security by use machine learning
Published 2019“…This method uses many layers to compute or process the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
7
Smart fall detection by enhanced SVM with fuzzy logic membership function
Published 2023“…In addition, they use thresholds to identify falls based on artificial experiences or machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Article -
8
A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification
Published 2020“…In this paper, a â��butterflyâ�� shape derived from the manipulation of the standard PV and OP data, which is more robust towards different loop dynamics, is developed for stiction detection. …”
Get full text
Get full text
Article -
9
-
10
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
Get full text
Get full text
Thesis -
11
A novel approach for handling missing data to enhance network intrusion detection system
Published 2025“…Our approach employs the Random Missing Value (RMV) algorithm to simulate missing data, enabling thorough testing and comparison of various imputation techniques. …”
Get full text
Get full text
Get full text
Article -
12
On some methods of feature engineering useful for craniodental morphometrics of rats, shrews and kangaroos / Aneesha Pillay Balachandran Pillay
Published 2024“…The results showed that the RFE-selected features were able to improve the classification accuracy of the machine learning algorithms. However, the linear measurements used in TM can only detect changes in size and can be insensitive to geometrical transformations. …”
Get full text
Get full text
Get full text
Thesis -
13
Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj
Published 2023“…This study presents the algorithm design, technique, and simulation of a Speech Recognition-based method to detect the correct articulation point (Makhraj) of the throat letters in the Quranic word. …”
Get full text
Get full text
Get full text
Article -
14
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
Get full text
Get full text
Thesis -
15
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…Standard base machine learning algorithms, which include a total of twelve individual methods as well as the AdaBoost and Bagging methods, are firstly used. …”
Get full text
Get full text
Get full text
Thesis -
16
Deep learning-based item classification for retail automation
Published 2025“…Real-time processing was achieved through the integration of object detection algorithms like YOLO and image segmentation techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…We utilised The Fuzzy Lattice Reasoning (FLR) classifier for classification algorithms in machine learning. This experiment utilised actual cryptojacking samples and achieved a 100 percent detection accuracy rate in simulation.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis -
19
Enhanced Deep Learning Framework for Fine-Grained Segmentation of Fashion and Apparel
Published 2022“…Consequently, the feature now includes both high-level and low-level image semantic feature information, boosting our overall segmentation frameworkâ��s performance. We use the Polyvore and DeepFashion2 databases for testing our algorithm, since these are the standard datasets used by the current methods for running the simulations. …”
Get full text
Get full text
Article -
20
Effective source number enumeration approach under small snapshot numbers
Published 2024“…The experimental conditions cover different snapshot numbers, SNRs, and noise backgrounds, aiming to simulate various complex environments in actual applications. …”
Get full text
Get full text
Get full text
Thesis
