Search Results - (( probable distribution using algorithm ) OR ( parameters detection method algorithm ))

Refine Results
  1. 1

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…We first look at the concentration parameter of von Mises distribution. The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering by Davari, Atefeh, Marhaban, Mohammad Hamiruce, Mohd Noor, Samsul Bahari, Karimadini, Mohammad, Karimoddini, Ali

    Published 2011
    “…Although the number of these target-like data is small, they may cause false alarm and perturb the target detection. K-distribution is known as the best fit probability density function for the radar sea clutter. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An empirical study of density and distribution functions for ant swarm optimized rough reducts by Pratiwi, Lustiana, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah

    Published 2011
    “…Coexistence, cooperation, and individual contribution to food searching by a particle (ant) as a swarm (colony) survival behavior, depict the common characteristics of both PSO and ACO algorithms. Ant colony approach in Ant Swarm algorithm generates local solutions which satisfy the Gaussian distribution for global optimization using PSO algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fault section detection and location on distribution network using analytical voltage sags database by Khalid, A.R., Mokhlis, Hazlie, Li, H.

    Published 2006
    “…By doing this all the possible sections due to the fault can be selected. Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Estimation of Transformers Health Index Based on Condition Parameter Factor and Hidden Markov Model by Selva A.M., Yahaya M.S., Azis N., Ab Kadir M.Z.A., Jasni J., Yang Ghazali Y.Z.

    Published 2023
    “…Electric transformers; Health; Hidden Markov models; Nonlinear programming; Probability distributions; Quality control; Viterbi algorithm; Condition parameters; Dissolved gas analysis; Distribution transformer; Emission probabilities; Health indices; Non-linear optimization; Remaining useful lives; Transition probabilities; Parameter estimation…”
    Conference Paper
  18. 18

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article