Search Results - ((detection algorithm) OR (((connection algorithm) OR (selection algorithm))))
Search alternatives:
- connection algorithm »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
2
Evaluation of boruta algorithm in DDoS detection
Published 2023“…To evaluate the Boruta algorithm, multiple classifiers (J48, random forest, naïve bayes, and multilayer perceptron) were used so as to determine the effectiveness of the features selected by the the Boruta algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Failure detection analysis of grid-connected photovoltaic system using an improved comparative based method / Fatin Azirah Mohd Shukor
Published 2022“…In order to gain feasible economic return, failure detection (FD) mechanisms are given utmost attention to monitor the performance and yet able to detect fault occurrence of the operating GCPV system especially in the form of analysis algorithm. …”
Get full text
Get full text
Thesis -
4
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…In order to train Ridgelet probabilistic neural network, a modified differential evolution algorithm with new mutation phase, crossover process, and selection mechanism is introduced. …”
Get full text
Get full text
Thesis -
6
DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection
Published 2021“…Consequently, in this paper, a novel hybrid weighted deep belief network (HW-DBN) algorithm is proposed for building an efficient and reliable IDS (DeepIoT.IDS) model to detect existing and novel cyberattacks. …”
Get full text
Get full text
Get full text
Article -
7
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Also, the algorithm for subsequent implementation of the selective adaptive bubble burst mitigation mechanism was presented. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…We focus on the outlier detection and background subtraction on image. This project proposed a two color segmentation techniques such as K-means and Fuzzy C-means clustering algorithm that are accurately segment the desired images, which have the same color as the pre-selected pixels with background subtraction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
Get full text
Get full text
Thesis -
10
-
11
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
Published 2015“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. Because neural networks perform best on detection, classification, learning and adaption, these features are employed to simulate the Safe Region (SR) to embed the watermark, thus, watermark are appropriately mapped to the mid frequency of selected coefficients. …”
Get full text
Get full text
Monograph -
12
-
13
Moving detection using cellular neural network (CNN)
Published 2008“…The video then are segmented into images using SC Video Developer. Ten images are selected to be used in this project. The algorithm created is used to detect the ball in the images. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
15
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
16
Intelligent failure connection algorithm for detecting internet worms
Published 2009“…In this paper, we show that our algorithm can detect new types of worms. This paper shows that intelligent Failure Connection Algorithm (IFCA) operation is faster than traditional algorithm in detecting worms.…”
Get full text
Get full text
Get full text
Article -
17
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…Different types of metaheuristic optimization tools have their unique features which vary from others and hence lead to different suitability in the particular application. Two metaheuristic algorithms i.e., Harmony Search (HS) and Gravitational Search Algorithm (GSA), are selected to integrate separately with a Radial Basis Function Network with Dynamic Decay Adjustment (RBFN-DDA) to perform condition monitoring in industrial processes. …”
Get full text
Get full text
Get full text
Thesis -
18
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…Multimodal support vector machine (SVM) algorithm was the commonest form of ML method utilized. …”
Get full text
Get full text
Get full text
Article -
19
Evaluation of feature selection algorithm for android malware detection
Published 2018“…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Article -
20
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis
