Search Results - (( rate detection method algorithm ) OR ( probable distribution function algorithm ))
Search alternatives:
- probable distribution »
- function algorithm »
- method algorithm »
- rate detection »
-
1
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
2
An empirical study of density and distribution functions for ant swarm optimized rough reducts
Published 2011“…To describe relative probability of different random variables, Probability Density Function (PDF) and the Cumulative Density Function (CDF) are capable to specify its own characterization of Gaussian distributions. …”
Get full text
Get full text
Get full text
Book Chapter -
3
A Comparative Performance Analysis of Gaussian Distribution Functions in Ant Swarm Optimized Rough Reducts
Published 2011“…Coexistence, cooperation, and individual contribution to food searching by a particle (ant) as a swarm (ant) survival behavior, depict the common characteristics of both algorithms. Solution vector of ACO is presented by implementing density and distribution function to search for a better solution and to specify a probability functions for every particle (ant). …”
Get full text
Get full text
Article -
4
Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks
Published 2017“…The utility function is defined as the average probability of false alarm per cognitive radio user. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory
Published 2017“…The utility function is defined as the average probability of false alarm per cognitive radio user. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching
Published 2016“…The probability function of the counts is often complicated thus a method using numerical Laplace transform inversion for computing the probabilities and the renewal function is proposed. …”
Get full text
Get full text
Thesis -
8
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
9
Cash-flow analysis of a wind turbine operator
Published 2023“…Two-parameter Weibull type probability density function (PDF) is used to model wind profile at two locations. …”
Conference Paper -
10
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…Thereafter, a multi-objective hybrid algorithm (MOHA), an extension of the self-adaptive hybrid algorithm is proposed and tested on the established multi-objective (MO) test functions. …”
Get full text
Get full text
Thesis -
11
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
13
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…A series of experimental results demonstrate that the proposed method can effectively detect anomalies with low false positive rate, high detection rate and achieve higher detection accuracy.…”
Get full text
Get full text
Get full text
Article -
14
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
15
On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection
Published 2022“…The experimental results demonstrate that the proposed method is better than that of the original ResNet and other existing methods on various metrics, reaching a 98.88% detection rate and 1.11% false alarm rate on the KDDTrain+ dataset…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat
Published 2020“…Determination of the best factor is carried out in a genetic algorithm by combining several parameters of the crossover probability (Pc) and mutation probability (Pm). …”
Get full text
Get full text
Get full text
Article -
17
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
Get full text
Get full text
Thesis -
18
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Improved Switching-Basedmedian Filter For Impulse Noise Removal
Published 2013“…Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
Get full text
Get full text
Thesis -
20
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis
