Search Results - (( using optimization method algorithm ) OR ( data distribution detection algorithm ))
Search alternatives:
- distribution detection »
- data distribution »
- method algorithm »
-
1
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
2
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
Get full text
Get full text
Thesis -
3
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
Get full text
Get full text
Thesis -
4
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Algorithmic level based methods however are based on introducing new optimization task to improve the minority class classification rate, without changing the data characteristics. …”
Get full text
Get full text
Get full text
Thesis -
5
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
Get full text
Get full text
Get full text
Thesis -
6
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
7
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…MATLAB was used to construct both standard BP and genetically optimized BP neural networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Assessment of landsat 7 scan line corrector-off data gap-filling methods for seagrass distribution mapping
Published 2015“…For optimal performance of the GNSPI algorithm, cloud and shadow in the primary and auxiliary images had to be removed by cloud removal methods prior to filling data gaps. …”
Get full text
Get full text
Article -
9
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…The second algorithm uses K Nearest Neighbour using a ratio of training data and testing data of 95:05 resulting in an accuracy value of 62%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
Get full text
Get full text
Thesis -
11
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…To classify image noise type, the CNN trained with Backpropagation (BP) algorithm and Stochastic Gradient Descent (SGD) optimization technique are implemented. …”
Get full text
Get full text
Get full text
Thesis -
12
Video colorization using canny optimization technique / Irwin Kevin Mueson
Published 2016“…Colorization process will be using the technique of Canny Optimization method. …”
Get full text
Get full text
Thesis -
13
Implementation of YOLOv8-seg on store products to speed up the scanning process at point of sales
Published 2024“…The small number of data points and the small number of epochs have proven reliable algorithms to implement on store products instead of using QR codes in a digital manner. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…Furthermore, PMTRF exhibits its resilience and adaptability to changing network conditions, accurately detects faulty switches, which is useful for fore-cast switch failures based on switch reliability within the network. …”
Get full text
Get full text
Get full text
Thesis -
15
Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System
Published 2019“…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
Get full text
Get full text
Conference or Workshop Item -
16
Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System
Published 2019“…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
Get full text
Get full text
Conference or Workshop Item -
17
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
18
High Impedance Fault Detection on Power Distribution Feeder
Published 2012“…The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
Get full text
Get full text
Get full text
Article -
19
Broken Conductor Detection on Power Distribution Feeder
Published 2013“…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis
