Search Results - (( intelligence based based algorithm ) OR ( intelligence based alarm algorithm ))
Search alternatives:
- intelligence based »
- alarm algorithm »
- based alarm »
-
1
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
2
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
3
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Artificial Intelligence Application in Power Generation Industry: Initial considerations
Published 2023Conference Paper -
7
-
8
Rabies Outbreak Prediction Using Deep Learning with Long Short-Term Memory
Published 2020Get full text
Get full text
Get full text
Book Chapter -
9
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
Get full text
Get full text
Get full text
Article -
10
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…A shortest path algorithmic was chosen for series of buildings connected by fiber optic network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
-
13
-
14
Video surveillance: Item monitoring against theft
Published 2023“…All the mentioned counters will be set to 0 if the conditions specified are not met. Based on the predetermined conditions for each type of risk, the appropriate alarms will be activated while a risk occurs. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…A fuzzy-based Naive Bayes algorithm has been used in this case. …”
Get full text
Get full text
Get full text
Thesis -
16
A comparative study of MPPT and voltage regulator controllers for controlling output voltage in PV applications
Published 2019“…However, most of the algorithms such as artificial intelligence and expert systems need high-end computing systems, which are costly and thus not suitable for normal household utilization. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
STPID-Model : A novel approach to Perimeter Intrusion Detection
Published 2023“…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
19
STPID-Model : A novel approach to Perimeter Intrusion Detection
Published 2023“…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
20
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article
