Search Results - (( based interaction method algorithm ) OR ( variable detection using algorithm ))
Search alternatives:
- interaction method »
- variable detection »
- based interaction »
- method algorithm »
- using algorithm »
-
1
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
2
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
Get full text
Get full text
Conference or Workshop Item -
3
FT-NIR, MicroNIR and LED-MicroNIR for detection of adulteration in palm oil via PLS and LDA
Published 2018“…Quantitative analysis was performed using partial least square (PLS) algorithms with the linear regression method. …”
Get full text
Get full text
Get full text
Article -
4
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
Get full text
Get full text
Get full text
Thesis -
5
FT-NIR, MicroNIR and LED-MicroNIR for detection of adulteration in palm oil via PLS and LDA
Published 2024journal::journal article -
6
Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis
Published 2011“…In this system,similar insolvent system, three methods including one variable at a time, Taguchi method and ANN were used for optimization and prediction of percentage of conversion. …”
Get full text
Get full text
Thesis -
7
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…The performance of the proposed methods is discussed using analysis and comparison of simulation results with wellknown methods in the field. …”
Get full text
Get full text
Thesis -
8
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
9
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
10
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
11
The development of deformable bodies collision response algorithm for interactive virtual environment
Published 2006“…Physical based deformation method usually suffers from high computation cost which does not favors practical interactive applications, even if the deformation only occurs in a small area of the deformable object. …”
Get full text
Get full text
Monograph -
12
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…To integrate machine learning and human interactions, this paper develops a new three-stage interactive algorithm in business analytics, called the interactive Nautilus-based algorithm, to address complex problems. …”
Get full text
Get full text
Article -
13
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
Get full text
Get full text
Thesis -
14
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The proposed algorithm has been applied to detect outliers in the high dimensional data. …”
Get full text
Get full text
Thesis -
15
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…In this paper, we propose a new method based on prime number and its characteristics mainly for interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
16
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…This work is interested in proposing an observer with fuzzy variable gains for a general nonlinear system. Furthermore, a linear model has been built to facilitate the accomplishment of the fault detection of the industrial servo system by using the proposed observer. …”
Get full text
Get full text
Get full text
Article -
17
A real time road marking detection system on large variability road images database
Published 2017“…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
Get full text
Get full text
Conference or Workshop Item -
18
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
19
Prime-based method for interactive mining of frequent patterns
Published 2010“…As response to the above-mentioned challenges, this study is devoted towards developing an interactive mining method based on prime number and its special characteristic “uniqueness” by which the content of the relevant data is transformed into a compact layout. …”
Get full text
Get full text
Thesis -
20
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article
