Search Results - (( network implementation using algorithm ) OR ( parameter detection method algorithm ))

Refine Results
  1. 1

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…The Fast Learning Network (FLN) is one of the new machine learning algorithms that are easy to implement, computationally efficient, and with excellent learning performance characteristics. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani by Ghani, Mazuraini

    Published 2005
    “…This project is all about implementing the back-propagation neural network algorithm in classification of face expression. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    The largest studentized residual test for bad data identification in state estimation of a power system by Khan, Z., Razali, R.B., Daud, H., Nor, N.M., Firuzabad, M.F.

    Published 2015
    “…The chi-square and normalized residual tests are the common post estimation procedures usually used for detection and identification of gross errors in the estimation algorithm. …”
    Get full text
    Get full text
    Article
  7. 7

    Detection of corneal arcus using rubber sheet and machine learning methods by Ramlee, Ridza Azri

    Published 2019
    “…Among the three neural network classifier used, BR is the best classifier. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis by Zolfaghari, Sahar

    Published 2016
    “…The fault detection and classification algorithm is carried out under the unknown dataset and the off-line testing results with 98.8% classification accuracy indicate good reliability of the proposed method in identifying broken rotor bars severity.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…Cross validation is used to find the best parameters related to kernels used followed by training and testing of the data sets. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Adaptive routing algorithms and implementation for TESH network by Miura, Yasuyuki, Kaneko, Masahiro, Rahman, M.M. Hafizur, Watanabe, Shigeyoshi

    Published 2013
    “…Also we evaluate the communication performance with hardware implementation. It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis