Search Results - normal distribution ((factor algorithm) OR (detection algorithm))

Refine Results
  1. 1

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  2. 2

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…Secondly, the cross stage partial (CSP) Darknet53 network and spatial pyramid pooling (SPP) module extract features from the input raw images, enhancing the accuracy of defect location detection and recognition in YOLO. Finally, the concept of model compression is integrated, utilizing scaling factors in the batch normalization (BN) layer, and introducing sparse factors to perform sparse training on the network. …”
    Get full text
    Get full text
    Article
  3. 3

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  5. 5

    Broken Conductor Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2013
    “…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    High Impedance Fault Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2012
    “…The algorithm for HIF detection based on the amplitude ratio of second and (3rd, 5th, 7th, 9th, 11th) harmonics to fundamental is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model by Sulaiman , Marizan, Adnan, Tawafan, Ibrahim, Zulkifilie

    Published 2013
    “…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…The algorithm for HIF detection based on the amplitude ratio of second and odd harmonics to fundamental is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Mitigating Unbalanced And Overlapped Problems Of Large Network Intrusion Data Using Multiplelevel Detection Techniques by Ho, Yan Bing

    Published 2022
    “…These problems have caused a low detection rate for intrusions that are the minority in data sets because learning algorithms favour the majority class (normal traffic). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Detection of arcing fault in underground distribution cable using artificial neural network by Chan, Wei Kian

    Published 2004
    “…The damage can be reduced if arcing faults are detected before they develop into major faults. The general aim of this study is to develop an arcing fault detection algorithm which can detect the presence of arcing fault in underground distribution cable. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique by Mohd Mawardi, Saari, Mohd Herwan, Sulaiman, Kiwa, Toshihiko

    Published 2023
    “…The PSO inverse technique is then applied to the magnetization curve to construct the magnetic moment distribution. A multimodal normalized log-normal distribution was used in the minimization of the objective function of the PSO inversion technique, and a modification of the PSO search region is proposed to improve the exploration and exploitation of the PSO particles. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Furthermore, the isolation line is tested on different section and load factor to recognize the improvement of optimal distribution network performance. …”
    Get full text
    Get full text
    Thesis
  18. 18

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…Based on the statistical results, all of the measured data were normally distributed and can be discriminated since the significant value for normality test for all measured data were greater than 0.05 and paired sample t-test showed significant value less than 0.05. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique by Mharib, Ahmed M.

    Published 2007
    “…The model is based on the bivariate normal distribution of the skin chromatic subspace. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article