Search Results - (( pattern detection method algorithm ) OR ( data distribution sensor algorithm ))
Search alternatives:
- distribution sensor »
- pattern detection »
- data distribution »
- method algorithm »
- sensor algorithm »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
2
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
3
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…Meanwhile, nine (9) classifier algorithms and forty (40) band stack combinations were deployed to classify the pothole edge. …”
Get full text
Get full text
Thesis -
4
Arima model time-series forecasting for structural monitoring using RTK-GPS
Published 2008“…In this paper, a time series algorithm is presented for damage identification and forecasting to detect any movement of the structure. …”
Get full text
Get full text
Conference or Workshop Item -
5
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…The main and definitive target of routing protocols in Wireless Sensor Networks (WSN) is passing data from the sensor nodes to the sink in most energy efficient manner besides considering the accuracy of data. …”
Get full text
Get full text
Thesis -
6
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
7
-
8
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…However, due to the nonuniform node distribution, there is a redundancy in sensed and transmitted data in dense area. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper
Published 2017“…Recently, wireless sensor networks have employed the concept of mobile agent to reduce energy consumption and obtain effective data gathering. …”
Get full text
Get full text
Get full text
Article -
11
Efficient k-coverage scheduling algorithms for wireless sensor networks / Ahmed Abdullah Saleh Al-Shalabi
Published 2014“…An efficient k-coverage algorithm for sensors with fixed sensing range (Maximum Layers Scheduling algorithm - MLS) is demonstrated. …”
Get full text
Get full text
Thesis -
12
A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks
Published 2017“…Moreover, each distributed MA has to carry the processing code (data aggregation code) to collect the sensory data and return back to the sink with the accumulated data. …”
Get full text
Get full text
Get full text
Article -
13
An Improved Distributed Scheduling Algorithm for Wireless Sensor Networks
Published 2012“…Simulation results show that the IDSA significantly outperforms a representative distributed random slot assignment algorithm (DRAND).…”
Get full text
Get full text
Conference or Workshop Item -
14
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
15
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…To make the sensor more reliable, temperature data must be collected over the length of the cable, or distributed data rather than point data. …”
text::Thesis -
16
Energy efficient geographical and power based clustering algorithm for heterogeneous wireless sensor networks
Published 2011“…Also, a large number of nodes are self-organized by a distributed cluster formation technique. Moreover, a randomized technique is used to rotate the local cluster-heads base on power label in order to evenly distribute the energy load among the sensors in the network. …”
Get full text
Get full text
Conference or Workshop Item -
17
MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks
Published 2019“…In most of the applications, the sensor nodes are distributed in a hostile area and nodes in WSNs are energy constrained, once it is installed, it would be difficult to recharge the energy source of those sensor nodes. …”
Get full text
Get full text
Conference or Workshop Item -
18
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Optimizing wireless sensor networks: A survey of clustering strategies and algorithms
Published 2024“…Wireless Sensor Networks (WSNs) are essential for real-time data collection and monitoring in various fields, such as environmental sensing, healthcare, industrial automation, and military surveillance. …”
Get full text
Get full text
Get full text
Article
