Search Results - (( features detection using algorithm ) OR ( data distribution function algorithm ))

Refine Results
  1. 1

    A new hybrid ensemble feature selection framework for machine learning-based phishing detection system by Chiew, Kang Leng, Tan, Choon Lin, Wong, KokSheik, Yong, Kelvin S.C., Tiong, Wei King

    Published 2019
    “…In the first phase of HEFS, a novel Cumulative Distribution Function gradient (CDF-g) algorithm is exploited to produce primary feature subsets, which are then fed into a data perturbation ensemble to yield secondary feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller by Aladaileh, Mohammad Adnan Ahmad

    Published 2021
    “…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. This paper applied Hilbert-Huang Transform (HHT) as a method to analyse the pressure transient signal. …”
    Get full text
    Get full text
    Article
  4. 4

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. This paper applied Hilbert-Huang Transform (HHT) as a method to analyse the pressure transient signal. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…We model the solution in the real setting of SDNs using High Level Petri Nets (HLPN), analyze the rules with Z language, and formally verified the correct functioning using Z3 SMT solver. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…The Android features were filtered before detection process using TF-IDF algorithm. …”
    Get full text
    Article
  8. 8

    Pipe Leak Diagnostic Using High Frequency Piezoelectric Pressure Sensor And Automatic Selection Of Intrinsic Mode Function by Hanafi, M. Yusop, M. F., Ghazali, M. F. M., Yusof, Remli, M. A. Pi, M. H., Kamarulzaman

    Published 2017
    “…This paper reveals that utilizing the application of an integrated kurtosis-based algorithm for a z-filter technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) allows/contributes to/leads to automatic selection of the IMF that should be used. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The performance of different mechanisms utilized to perform the anomaly detection depends heavily on the group of features used. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm by Zuwairie, Ibrahim, Mohd Zaidi, Mohd Tumari, Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Mohd Ibrahim, Shapiai

    Published 2014
    “…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost) by Mohd. Zin, Zalhan, Khalid, Marzuki, Yusof, Rubiyah

    Published 2007
    “…Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…Three algorithms were used to accomplish the task of feature representation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Some of the previous researchers used a feature set selection which is introduced for IDS but there still shortage in their detection rate and selected amounts of features. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm by Mohd. Zin, Zalhan

    Published 2007
    “…With these new feature types and larger search space, Genetic Algorithm (GA) is used within the Adaboost framework, to find sets of features which can provide a better cascade of boosted classifiers with a shorter training time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Feature-based face recognition system using utilized artificial neural network by Chai, Tong Yuen

    Published 2010
    “…The main contributions of this project are the automatic algorithms for mouth detection, facial features cropping and face classification. …”
    Get full text
    Thesis