Search Results - (( variable activation detection algorithm ) OR ( based application using algorithm ))
Search alternatives:
- activation detection »
- based application »
- using algorithm »
- variable »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
2
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
Get full text
Get full text
Thesis -
4
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…However, analysis of mobile and wearable sensor data for human activity detection is still very challenging. This is further worsen by the use of single sensors modality and machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
5
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…Despite the effective proposed GMPPT algorithm, the PSCs reduce the maximum power extraction capability of the PV system heavily due to the activation of bypass diodes. …”
Get full text
Get full text
Get full text
Thesis -
6
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
7
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
9
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The proposed control technique adopts 6 active voltage vectors in the discrete predictive model among 14 available active vectors based on the position of the future reference vector. …”
Get full text
Get full text
Get full text
Thesis -
10
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
Get full text
Get full text
Thesis -
11
Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis
Published 2011“…In this system,similar insolvent system, three methods including one variable at a time, Taguchi method and ANN were used for optimization and prediction of percentage of conversion. …”
Get full text
Get full text
Thesis -
12
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…The performance of the algorithm achieved a sensitivity of 100% for QRS onset detection and 100% for T offset detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019“…The main objective for this study is to analyse the harmonics components in AC power system using Fast Fourier Transforms (FFT) algorithm. Other than that, the objective is also to design and develop the harmonic detection system for power quality of AC power system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS
Published 2011“…The first intelligent monitoring system represents the use of the pure artificial neural network system for boiler trip detection. The final architecture for this system has been explored after investigation of various main neural network topology combinations which include one and two hidden layers, one to ten neurons for each hidden layer, three types of activation function, and four types of multidimensional minimization training algorithms. …”
Get full text
Get full text
Thesis -
15
A peer-to-peer blockchain based interconnected power system
Published 2021“…It describes the simulation analysis and reduction of harmonics detection in a peer-to-peer interconnected 3-phase power system with the help of an FFT algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…Large scales of human activities are continuously increasing the area which can be term as urban. …”
Get full text
Get full text
Thesis -
17
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Intrusion detection systems (IDSs) effectively balance additional security in a computer system by identifying intrusive activities on a computer system, and their enhancements are developing at a surprising rate. …”
Get full text
Get full text
Thesis -
18
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis
