Search Results - normal distribution ((function algorithm) OR (detection algorithm))

Refine Results
  1. 1

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique by Mohd Mawardi, Saari, Mohd Herwan, Sulaiman, Kiwa, Toshihiko

    Published 2023
    “…The PSO inverse technique is then applied to the magnetization curve to construct the magnetic moment distribution. A multimodal normalized log-normal distribution was used in the minimization of the objective function of the PSO inversion technique, and a modification of the PSO search region is proposed to improve the exploration and exploitation of the PSO particles. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  4. 4

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…To do this evaluation, the mixtures of bivariate normal distribution with different percentage of contribution are simulated. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  9. 9

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…In a recent study, the analysis of pressure transient signals could be seen as an accurate and low-cost method for leak and feature detection in water distribution systems. Transient phenomena has occur due to the sudden changes in the fluid’s propagation in pipelines system caused by the rapid pressure and flow fluctuation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Broken Conductor Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2013
    “…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    High Impedance Fault Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2012
    “…The algorithm for HIF detection based on the amplitude ratio of second and (3rd, 5th, 7th, 9th, 11th) harmonics to fundamental is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model by Sulaiman , Marizan, Adnan, Tawafan, Ibrahim, Zulkifilie

    Published 2013
    “…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…The algorithm for HIF detection based on the amplitude ratio of second and odd harmonics to fundamental is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Mitigating Unbalanced And Overlapped Problems Of Large Network Intrusion Data Using Multiplelevel Detection Techniques by Ho, Yan Bing

    Published 2022
    “…These problems have caused a low detection rate for intrusions that are the minority in data sets because learning algorithms favour the majority class (normal traffic). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…For this purpose, the normal distributions are applied to each class. The parameters of this distribution are optimized by applying the proposed MOHA. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Detection of arcing fault in underground distribution cable using artificial neural network by Chan, Wei Kian

    Published 2004
    “…The damage can be reduced if arcing faults are detected before they develop into major faults. The general aim of this study is to develop an arcing fault detection algorithm which can detect the presence of arcing fault in underground distribution cable. …”
    Get full text
    Get full text
    Get full text
    Thesis