Search Results - (( using simulation method algorithm ) OR ( risk detection method algorithm ))
Search alternatives:
- simulation method »
- method algorithm »
- risk detection »
-
1
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
2
Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model
Published 2000“…These estimates were then compared to the Newton-Raphson iteration method. A generated data where the failure times were taken as exponentially distributed was used to further compare these two methods of estimation. …”
Get full text
Get full text
Thesis -
3
Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment
Published 2019“…The Euclidean distances of detected lines from ground truth are used to compare the accuracy of the proposed method. …”
Get full text
Get full text
Thesis -
4
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
5
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…The x chart, R chart and Cp, and Cpk are examined for the possibility of being used to detect the state of control of the covariates in the two competing risks models (Cox’s with Weibull distribution (PHW2) and modification of weighted score function (MW)). …”
Get full text
Get full text
Thesis -
6
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…We utilised The Fuzzy Lattice Reasoning (FLR) classifier for classification algorithms in machine learning. This experiment utilised actual cryptojacking samples and achieved a 100 percent detection accuracy rate in simulation.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region
Published 2016“…In this study, rockfall source areas were identified using multi-criteria method based on DEM derivates, terrain type or land use/cover (LULC) and high spatial resolution aerial photo (13cm). …”
Get full text
Get full text
Thesis -
8
Diagnosis of vocal fold pathology using time-domain features and systole activated neural network
Published 2010Get full text
Working Paper -
9
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Moreover, the projected trust model (ETDMA) integrate direct communication trust and indirect trust with the help of a logical time window that periodically records the trustworthy and suspicious interactions. Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94), FNR (0.9), F1-Score (0.6), and accuracy (92) in the presence of 50 malicious nodes. …”
Get full text
Get full text
Article -
10
-
11
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
12
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
13
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph -
14
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
Get full text
Get full text
Get full text
Thesis -
15
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Conference or Workshop Item -
16
Slope inspection system using image processed by machine learning algorithm to determine risk of slope failure
Published 2020“…The conventional method is inefficient and time-consuming. In this paper, the potential of a machine-learning algorithm to improve the conventional approach in detecting the hazard in a landslide is discussed. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff
Published 2007“…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
Get full text
Get full text
Thesis -
18
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
19
Slope inspection system: using image processed by machine learning algorithm to determine risk of slope failure
Published 2020“…The conventional method is inefficient and time-consuming. In this paper, the potential of a machine-learning algorithm to improve the conventional approach in detecting the hazard in a landslide is discussed. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network
Published 2005“…This routing problem is an NPhard problem. Many algorithms are designed by many researchers to perform this routing such as window method, sequential algorithm, degree-descending algorithm, simulated annealing algorithm, genetic algorithm and ant colony algorithm.This thesis explores two approaches, sequential and parallel approaches. …”
Get full text
Get full text
Thesis
