Search Results - (( intelligence system based algorithm ) OR ( intelligence based alarm algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- alarm algorithm »
- based alarm »
-
1
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Firstly, we review the state of the art of intelligent intrusion detection and prevention system (IIDPS), and highlight the security requirement of cooperative based-IIDPS. …”
Get full text
Get full text
Thesis -
2
-
3
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. …”
Get full text
Get full text
Get full text
Article -
4
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
6
Rabies Outbreak Prediction Using Deep Learning with Long Short-Term Memory
Published 2020Get full text
Get full text
Get full text
Book Chapter -
7
Artificial Intelligence Application in Power Generation Industry: Initial considerations
Published 2023Conference Paper -
8
-
9
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…This work proposes an improved framework for FDA system to ensure a robust intelligent network of FDA control panels in real-time. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Video surveillance: Item monitoring against theft
Published 2023“…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
A comparative study of MPPT and voltage regulator controllers for controlling output voltage in PV applications
Published 2019“…However, most of the algorithms such as artificial intelligence and expert systems need high-end computing systems, which are costly and thus not suitable for normal household utilization. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
STPID-Model : A novel approach to Perimeter Intrusion Detection
Published 2023“…In order to solve these problems in perimeter intrusion detection systems (PIDS). In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
17
STPID-Model : A novel approach to Perimeter Intrusion Detection
Published 2023“…In order to solve these problems in perimeter intrusion detection systems (PIDS). In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
18
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
Article -
19
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
20
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis
