Search Results - data distribution ((((function algorithm) OR (connection algorithm))) OR (detection algorithm))
Search alternatives:
- connection algorithm »
- function algorithm »
- data distribution »
-
1
-
2
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
3
High Impedance Fault Detection on Power Distribution Feeder
Published 2012“…The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
Get full text
Get full text
Get full text
Article -
4
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
Get full text
Get full text
Thesis -
5
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…The results are then communicated between hardware circuit and simulation circuit for the final conclusion with the properly functional algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
7
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
11
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
12
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article -
14
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…To preserve the correct functioning of the entire SDN architecture, an efficient detection of various distributed coordinated attacks and anomalies triggered by large-scale malicious events that predominantly target the control plane is of paramount concern and an increasingly important research topic. …”
Get full text
Get full text
Thesis -
15
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025Article -
16
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
17
-
18
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper provides an overview of localization algorithms, including centralized and distributed algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering
Published 2011“…K-distribution is known as the best fit probability density function for the radar sea clutter. …”
Get full text
Get full text
Article -
20
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…However, by changing the distribution of both classes, the original classes distribution that are followed by that particular data will be violated. …”
Get full text
Get full text
Get full text
Thesis
