Search Results - (( variable (detector OR detect) detection algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- variable »
-
1
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…In this research, the Real-Valued Negative Selection with fixed-sized detectors (RNSA) and Real-Valued Negative Selection with variable-sized detectors (V-Detector) were applied for classification and detection of anomalies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Integrated face detection approach for far image application
Published 2016“…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
Get full text
Get full text
Thesis -
4
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…It is shown via simulation that the combined RLS adaptive algorithm with the linear MMSE multiuser detector provides the best overall performance. …”
Get full text
Get full text
Thesis -
5
Advanced fault detection in DC microgrid system using reinforcement learning
Published 2021“…The results showed that the improved Negative Selection Algorithm with variable sized detector has better performance than the general Negative Selection Algorithm with constant sized radius in detecting fault in DC microgrid system.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Thus, an Extremal Region Detection (ERD) algorithm in MSER is improved by finding optimum configuration of MSER parameters, allowing the quantity of interest points for certain food images to be increased appropriately. …”
Get full text
Get full text
Thesis -
7
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. The performance of our system was measured in terms of detection rate, accuracy, and false alarm rate. …”
Get full text
Get full text
Thesis -
8
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Results showed that the developed FDD algorithm successfully detect and diagnosed the pre-designed faults. …”
Get full text
Get full text
Monograph -
9
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detection / Nur Asikin Mohd Sayud
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
10
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
Get full text
Get full text
Get full text
Article -
11
Detection and Classification of Moving Objects for an Automated Surveillance System
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis -
12
Detection and classification of moving objects for an automated surveillance system
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis -
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
14
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…The results show the algorithm used in this research can reduce the test suite size as well as significantly improve the fault detection effectiveness. …”
Get full text
Get full text
Thesis -
15
A real time road marking detection system on large variability road images database
Published 2017“…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
Get full text
Get full text
Conference or Workshop Item -
16
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
17
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
18
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This paper presents a contribution to research on norms detection by proposing a technique, which is called the Potential Norms Detection Technique (PNDT). …”
Short Survey -
19
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
20
Detection and classification of moving objects for an automated surveillance system
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis
