Search Results - (( rate detection method algorithm ) OR ( data distribution methods algorithm ))
Search alternatives:
- distribution methods »
- data distribution »
- methods algorithm »
- method algorithm »
- rate detection »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
2
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
3
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Results show that the proposed method is able to detect islanding conditions with 100% accuracy, 100% detection rate and 0% false alarm with detection time of less than 0.19s. …”
Get full text
Get full text
Thesis -
4
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Algorithmic level based methods however are based on introducing new optimization task to improve the minority class classification rate, without changing the data characteristics. …”
Get full text
Get full text
Get full text
Thesis -
5
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
6
Design and analysis of management platform based on financial big data
Published 2023“…In order to make financial big data generate business value and improve the information application level of financial management, aiming at the high error rate of current financial data classification system, this article adopts the fuzzy clustering algorithm to classify financial data automatically, and adopts the local outlier factor algorithm with neighborhood relation (NLOF) to detect abnormal data. …”
Get full text
Get full text
Get full text
Article -
7
Modified sequential fences for identifying univariate outliers
Published 2016“…The modified sequential fences method is found can accurately detect the outliers in positively skewed distribution. …”
Get full text
Get full text
Thesis -
8
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…In this data collection method, part of the dataset contains erroneous data, as measurements are always associated with uncertainties. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
10
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
11
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…Meanwhile, nine (9) classifier algorithms and forty (40) band stack combinations were deployed to classify the pothole edge. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20
