Search Results - (( does detection learning algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- detection learning »
- learning algorithm »
- implication force »
- java implication »
- force algorithm »
- does detection »
-
1
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Currently, academic literature does not really cover the topic of unsupervised machine learning techniques for anomaly detection. …”
Get full text
Get full text
Article -
2
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
4
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
Published 2020“…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
Get full text
Get full text
Get full text
Article -
6
Deep learning for face detection using matlab
Published 2020“…This project report presents face detection using Convolutional Neural Network algorithm and Deep Learning combination (DCT / DL) throughout MATLAB simulation and modeling. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
8
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
Get full text
Get full text
Article -
9
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
10
Detection of surface defects of aluminium extrudants using artificial intelligence
Published 2024“…Although nowadays some manufacturing industries have implemented algorithms to automate the detection of defects, those algorithms face challenges on dealing with noises and lighting changes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Evaluation of fall detection classification approaches
Published 2012“…The acceleration data with a total data of 6962 instances and 29 attributes were used to evaluate the performance of the different classification algorithm. Results show that the Multilayer Perceptron algorithm is the best option among other mentioned algorithms, due to its high accuracy in fall detection.…”
Get full text
Get full text
Conference or Workshop Item -
12
Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri
Published 2007“…They does not realized by applying e-learning concept will give more benefits to both lecturer and students. …”
Get full text
Get full text
Thesis -
13
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…To overcome this limitation, the Q-Learning algorithm was proposed by several researchers to minimise randomness. …”
Get full text
Get full text
Get full text
Thesis -
14
Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study
Published 2022“…For this reason, this study compares eleven machine learning algorithms to determine which one produces the best accuracy for predicting thyroid risk accurately. …”
Get full text
Get full text
Get full text
Article -
15
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System
Published 2012“…The algorithm for HIF detection based on the amplitude ratio of second and odd harmonics to fundamental is presented. …”
Get full text
Get full text
Get full text
Article -
17
Design and analysis of an early heart attack detection using openCV
Published 2022“…Hyper-parameter tuning method also has been applied to see does the algorithm increase accuracy or not.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Fuzzy support vector machine based fall detection method for traumatic brain injuries: A new systematic approach of combining fuzzy logic with support vector machine to achieve hig...
Published 2022“…More specifically, some values of falls are inaccurate and similar to the features of normal activities, which can also greatly impact the performance of the learning ability of SVMs. Hence, it became necessary to look for an effective fall detection method based on a combination of Fuzzy Logic (FL) and SVM algorithms so as to reduce false positive alarms and improve accuracy. …”
Get full text
Get full text
Get full text
Article -
19
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…The selection would be made based on the hybrid machine learning (ML) algorithm. A fuzzy-based Naive Bayes algorithm has been used in this case. …”
Get full text
Get full text
Get full text
Thesis -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…These algorithms are aimed at overcoming them in terms of offering high accuracy and reduced computational time, the quality of their outcomes still does not fulfill researchers. …”
Get full text
Get full text
Thesis
