Search Results - (( variable integration based algorithm ) OR ( variable detection using algorithm ))

Refine Results
  1. 1

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…Based on these results, future research should focus on enhancing the core algorithm to be more resilient to variable lighting and distance, thereby reducing false positives and negatives. …”
    Get full text
    Get full text
    Article
  5. 5

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification by Kamaruddin, B., Zabiri, H., Mohd Amiruddin, A.A.A., Teh, W.K., Ramasamy, M., Jeremiah, S.S.

    Published 2020
    “…In most methods for shape-based stiction detection, they rely heavily on the traditional controller output (OP) and process variable (PV) plot (i.e. …”
    Get full text
    Get full text
    Article
  7. 7

    Modelling of cupping suction system based on system identification method by Suresh, Kavindran, Ghazali, M. R., Ahmad, M. A.

    Published 2022
    “…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    HABC: Hybrid artificial bee colony for generating variable T-way test sets by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2020
    “…This paper proposed a hybrid artificial bee colony (HABC) strategy based on the hybrid artificial bee colony algorithm and practical swarm optimization to generate optimal test suite of variable strength interaction. …”
    Get full text
    Get full text
    Article
  9. 9

    HABC: Hybrid artificial bee colony for generating variable T-way test sets by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2020
    “…This paper proposed a hybrid artificial bee colony (HABC) strategy based on the hybrid artificial bee colony algorithm and practical swarm optimization to generate optimal test suite of variable strength interaction. …”
    Get full text
    Get full text
    Article
  10. 10

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm by Nurin Alya, Haris

    Published 2023
    “…The primary goal is to use the Random Forest algorithm, an effective machine learning technique, to predict instances of cheating based on the behavioural patterns of participants. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…The proposed scheme integrates an ADS and signature-based detection system (SDS) approach for better and rapid intrusion detection. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…Pearson chi-squared value was used to find the best classification fit between the dependent variable and conditioning factors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…The input and output data were used to create this modeling output variable of the cupping suction system is detected by connecting a differential pressure sensor to the cup, while the input variable is determined by the speed of the pump applied in various locations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Google the earth: what's next? by Mansor, Shattri

    Published 2010
    “…Satellite imagery/data can be used for everything from ground truthing and change detection, to more sophisticated analyses, including feature extraction and natural hazard prediction. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  19. 19

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
    Get full text
    Get full text
    Thesis