Search Results - (( does detection model algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- detection model »
- model algorithm »
- does detection »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
2
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
4
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
5
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…The detection model is trained with only message timing information, making it applicable to all vehicles regardless of make and model. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Continuous collision detection for virtual environments: A walkthrough of techniques
Published 2011“…While DCD requires backtracking after collision has been detected, CCD does not suffer the same problems as DCD. …”
Get full text
Get full text
Get full text
Article -
7
Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model
Published 2013“…This paper proposes an intelligent algorithm using the Takagi Sugeno- Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article -
8
Broken Conductor Detection on Power Distribution Feeder
Published 2013“…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article -
9
High Impedance Fault Detection on Power Distribution Feeder
Published 2012“…This paper presents an intelligent algorithm using a Takagi Sugeno-Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect high impedance fault. …”
Get full text
Get full text
Get full text
Article -
10
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Currently, academic literature does not really cover the topic of unsupervised machine learning techniques for anomaly detection. …”
Get full text
Get full text
Article -
11
Detection of surface defects of aluminium extrudants using artificial intelligence
Published 2024“…However, the implementation of attention modules does not increase the performance of the model. The final model achieved a mAP@0.5 of 94.3% and 79.7% of mAP@0.5:0.95 compared to the original YOLOv8n model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
13
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
Published 2020“…The algorithm will flag any sample that does not fit the background feature as an abnormality. …”
Get full text
Get full text
Get full text
Article -
14
Wind Turbines: Novel Control Algorithm in Region II
Published 2014Get full text
Get full text
Get full text
Get full text
Article -
15
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…A high number of interest regions does not guarantee outstanding classification performance as redundant interest regions as well as interest regions from food images with complex background were detected. …”
Get full text
Get full text
Thesis -
16
Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System
Published 2012“…This paper proposes an intelligent algorithm using an adaptive neural- Takagi Sugeno-Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect high impedance fault. …”
Get full text
Get full text
Get full text
Article -
17
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
Get full text
Get full text
Thesis -
18
Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique
Published 2007“…This thesis shows that the Gaussian mixture model alone or the Gaussian single model does not improve the performance of the skin detection model due to the number of false detections for high correct classification. …”
Get full text
Get full text
Thesis -
19
An Automated Method For Model-Plant Mismatch Detection And Correction In Process Plants Employing Model Predictive Control (MPC)
Published 2012“…Since MPM has significant effect on MPC performance, the model has to be corrected and updated whenever high MPM is detected. …”
Get full text
Get full text
Final Year Project -
20
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item
