Search Results - data distribution ((((function algorithm) OR (selection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  3. 3

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  4. 4

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Article
  6. 6

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The HHT is a way to decompose a signal into intrinsic mode functions (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  8. 8

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…In order to evaluate the performance of SVGPM against current methods in solving imbalanced classification task, three experiments are conducted such as on selected standard class imbalanced benchmark data sets, intrusion detection system (IDS) data set and remote sensing data set. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…Tests have shown that the differences are demonstrated only in execution time to arrive the best fitness function of the Genetic Algorithm. Whereas the results obtained from both selection methods are similar to each other. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  14. 14

    A new hybrid ensemble feature selection framework for machine learning-based phishing detection system by Chiew, Kang Leng, Tan, Choon Lin, Wong, KokSheik, Yong, Kelvin S.C., Tiong, Wei King

    Published 2019
    “…In the first phase of HEFS, a novel Cumulative Distribution Function gradient (CDF-g) algorithm is exploited to produce primary feature subsets, which are then fed into a data perturbation ensemble to yield secondary feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The overall software design is divided into three modules which are Image Acquisition, Image Processing and Object Detection, and Data Transmission module. The image processing algorithm includes color space conversion and motion analysis technique. …”
    Get full text
    Thesis
  16. 16

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  19. 19

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
    Get full text
    Get full text
    Thesis