Search Results - (( using active detection algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…This algorithm is based on two detection schemes; namely active and passive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2018
    “…The merging of these two methods enables the algorithm to distinguish between hand open and hand close activities by using sEMG signal collected by only one channel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  9. 9

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…A comparison between the performance of an amplitude-independent muscle activity detection algorithm and three amplitude-dependent algorithms was conducted by using sEMG signals recorded from six hemiparesis stroke survivors and from six healthy subjects. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake by Mat Ibrahim, Masrullizam, Soraghan , John, Abd Manap, Nurulfajar

    Published 2014
    “…This paper presents a new method to localise iris by using Fuzzy Centre Detection (FCD) scheme and active contour Snake. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20