Search Results - (( network implementation using algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- network implementation »
- implementation using »
- parameter detection »
- method algorithm »
- using algorithm »
-
1
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…The Fast Learning Network (FLN) is one of the new machine learning algorithms that are easy to implement, computationally efficient, and with excellent learning performance characteristics. …”
Get full text
Get full text
Thesis -
2
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
3
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
4
Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani
Published 2005“…This project is all about implementing the back-propagation neural network algorithm in classification of face expression. …”
Get full text
Get full text
Thesis -
5
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
The largest studentized residual test for bad data identification in state estimation of a power system
Published 2015“…The chi-square and normalized residual tests are the common post estimation procedures usually used for detection and identification of gross errors in the estimation algorithm. …”
Get full text
Get full text
Article -
7
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…Among the three neural network classifier used, BR is the best classifier. …”
Get full text
Get full text
Thesis -
8
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
9
MRFGRO: a hybrid meta-heuristic feature selection method for screening COVID-19 using deep features
Published 2021“…Computed Tomography (CT) scans are used to monitor lung diseases including COVID-19. …”
Get full text
Get full text
Article -
10
Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis
Published 2016“…The fault detection and classification algorithm is carried out under the unknown dataset and the off-line testing results with 98.8% classification accuracy indicate good reliability of the proposed method in identifying broken rotor bars severity.…”
Get full text
Get full text
Thesis -
11
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
12
Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar
Published 2012“…Cross validation is used to find the best parameters related to kernels used followed by training and testing of the data sets. …”
Get full text
Get full text
Thesis -
13
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis -
14
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
15
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
16
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
18
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Adaptive routing algorithms and implementation for TESH network
Published 2013“…Also we evaluate the communication performance with hardware implementation. It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
Get full text
Get full text
Get full text
Article -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis
