Search Results - (( intelligence based dea algorithm ) OR ( intelligence based alarm algorithm ))
Search alternatives:
- intelligence based »
- alarm algorithm »
- dea algorithm »
- based alarm »
- based dea »
-
1
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Apart from that, sizing algorithm with DEA was also discovered to outperform sizing algorithms with selected computational intelligence, i.e. …”
Get full text
Get full text
Thesis -
2
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
3
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Rabies Outbreak Prediction Using Deep Learning with Long Short-Term Memory
Published 2020Get full text
Get full text
Get full text
Book Chapter -
7
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
8
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Artificial Intelligence Application in Power Generation Industry: Initial considerations
Published 2023Conference Paper -
10
-
11
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
Get full text
Get full text
Get full text
Article -
12
Video surveillance: Item monitoring against theft
Published 2023“…All the mentioned counters will be set to 0 if the conditions specified are not met. Based on the predetermined conditions for each type of risk, the appropriate alarms will be activated while a risk occurs. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
-
15
-
16
A comparative study of MPPT and voltage regulator controllers for controlling output voltage in PV applications
Published 2019“…However, most of the algorithms such as artificial intelligence and expert systems need high-end computing systems, which are costly and thus not suitable for normal household utilization. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
Article -
19
STPID-Model : A novel approach to Perimeter Intrusion Detection
Published 2023“…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
20
STPID-Model : A novel approach to Perimeter Intrusion Detection
Published 2023“…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
Get full text
Get full text
Conference or Workshop Item
