Search Results - (( using simulation method algorithm ) OR ( rate detection method algorithm ))
Search alternatives:
- simulation method »
- method algorithm »
- rate detection »
-
1
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…Then, rate of shoreline is simulated by using velocity bunching model. …”
Get full text
Get full text
Conference or Workshop Item -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
3
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…Analysis of moving object detection methods is presented in this paper, includes Artificial Neural Network (ANN) and Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
5
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
6
-
7
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…The performance in terms of average intrusion detection rate and false alarm rate of the proposed method and other available techniques were analyzed to evaluate and determine the best performance. …”
Get full text
Get full text
Get full text
Article -
8
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
9
Recursive linear network modeling for detecting gas leak
Published 2010“…Relative mass loss of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
11
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Results show that the proposed method is able to detect islanding conditions with 100% accuracy, 100% detection rate and 0% false alarm with detection time of less than 0.19s. …”
Get full text
Get full text
Thesis -
12
Smart fall detection by enhanced SVM with fuzzy logic membership function
Published 2023“…An overall accuracy of about 99.87% in detecting the fall function was obtained. Furthermore, the overall sensitivity of 100% with no false negative rate obtained was achieved by implementing the proposed method. …”
Get full text
Get full text
Get full text
Article -
13
Reduced complexity optimum detector for block data transmission systems
Published 2010Get full text
Article -
14
-
15
Fatigue State Detection Through Multiple Machine Learning Classifiers Using EEG Signal
Published 2023“…The study revealed that employing all the classifiers resulted in a satisfactory accuracy rate compared to existing state-of-the-art methods for detecting fatigue states. …”
Get full text
Get full text
Get full text
Article -
16
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The results of bit error rate simulation have shown that reduced rank-JCE based detectors have an improvement by 5 dB lower than other traditional full rank-JCE based detectors.…”
Get full text
Get full text
Article -
17
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
18
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The results of bit error rate simulation have shown that reduced rank-JCE based detectors have an improvement by 5 dB lower than other traditional full rank-JCE based detectors.…”
Get full text
Get full text
Article -
19
A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification
Published 2020“…Based on the 15 benchmark industrial loops with stiction, the proposed BSD-CNN quantification algorithm has shown reasonable accuracy when compared to other published quantification methods in literature. …”
Get full text
Get full text
Article -
20
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…In this method of analysis the exponential signal is converted to a convolution model whose input is a train of weighted delta function that contains the signal parameters to be determined.The resolution of the estimated decay rates is poor if the conventional fast Fourier transform (FFT) algorithm is used to analyse the resulting deconvolved data. …”
Get full text
Get full text
Get full text
Article
