Search Results - (( variable detection based algorithm ) OR ( variable generation learning algorithm ))

Refine Results
  1. 1

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Gas Identi cation by Using a Cluster-k-Nearest-Neighbor by Brahim Belhaouari, samir

    Published 2009
    “…Therefore for that reason we develop another algorithm for clustering space which contributes a higher accuracy compares to K-means cluster with less subclass number, higher stability and bounded time of classification with respect to the variable data size. …”
    Get full text
    Get full text
    Article
  4. 4

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The performance of algorithms was measured based on classification accuracy, error rate, and precision and recall. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine by Molla Salilew, W., Ambri Abdul Karim, Z., Alemu Lemma, T.

    Published 2022
    “…The present study investigates the accuracy of different machine learning classification algorithms with three different data smoothing techniques for gas turbine fault detection and isolation task. …”
    Get full text
    Get full text
    Article
  7. 7

    Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine by Molla Salilew, W., Ambri Abdul Karim, Z., Alemu Lemma, T.

    Published 2022
    “…The present study investigates the accuracy of different machine learning classification algorithms with three different data smoothing techniques for gas turbine fault detection and isolation task. …”
    Get full text
    Get full text
    Article
  8. 8

    Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke by Henry Friday , Nweke

    Published 2019
    “…However, analysis of mobile and wearable sensor data for human activity detection is still very challenging. This is further worsen by the use of single sensors modality and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Non-fungible token based smart manufacturing to scale Industry 4.0 by using augmented reality, deep learning and industrial Internet of Things by Ahmed Khan, Fazeel, Ibrahim, Adamu Abubakar

    Published 2023
    “…The next phase was deploying deep learning algorithms on a dataset having data generated from IIoT devices and sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…Machine learning models have been effectively applied to predict certain variable in several engineering applications where the variable is highly stochastic in nature and complex to identify utilizing the classical mathematical models. …”
    Article
  11. 11

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  17. 17

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  20. 20