Search Results - (( pattern selection based algorithm ) OR ( using detection method algorithm ))
Search alternatives:
- pattern selection »
- method algorithm »
- selection based »
- using detection »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
3
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
5
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
6
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
7
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…The Sum of Absolute Different (SAD) is the matching cost’s method and some threshold adjustment were used in this thesis where the SAD’s window size of 11 and threshold value of 0.8 was selected based on the experimental results. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…In this research, technique selection is done by doing some literature review to find the best one and also studying about the algorithm of each technique has. …”
Get full text
Get full text
Thesis -
9
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
10
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
11
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…Two types of experiments are conducted using the proposed feature extraction and classification algorithms. …”
Get full text
Thesis -
12
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The study of traditional marble game will be implemented in a game prototype using Ant Colony Optimization (ACO). ACO technique is used for searching method in order to find the nearest marble that can be selected to be shot. …”
Get full text
Get full text
Thesis -
13
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
14
Image clustering comparison of two color segmentation techniques
Published 2010“…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…For this purpose, this study used the intensification and diversification properties of the recently proposed moth-flame optimisation (MFO) algorithm and utilised the algorithm in the proposed feature selection scheme. …”
Get full text
Get full text
Get full text
Article -
16
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…For generating an interpretable deep architecture for identifying deep intrusion patterns, this study proposes an approach that combines ANFIS (Adaptive Network-based Fuzzy Inference System) and DT (Decision Tree) for interpreting the deep pattern of intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…Adaptive detection is the learning ability to detect any changes in patterns in intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
18
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
Get full text
Get full text
Get full text
Article -
19
Defect detection based on extreme edge of defective region histogram
Published 2018“…To evaluate the proposed defect-detection method, common standard images for experimentation were used. …”
Get full text
Get full text
Article -
20
Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network
Published 2009“…Experimentally observed responses were used to train, map and optimize the network algorithms before the best architecture was selected. …”
Get full text
Get full text
Article
