Search Results - (( data application force algorithm ) OR ( data normalization based algorithm ))
Search alternatives:
- normalization based »
- data normalization »
- application force »
- data application »
- force algorithm »
-
1
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
2
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
3
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
4
Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining
Published 2019“…The main goal of this study is to examine the effect of various geometrical attributes to predict the leaf mechanical properties based on four different indicators using data mining approach. …”
Get full text
Get full text
Thesis -
5
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…Secondly, the modeling method of the proposed PV module is validated by experimental data. In the sizing of the SAPV system, the mutation adaptive DE (MADE) algorithm based multi-objective functions minimizes three constraint objective functions. …”
Get full text
Get full text
Thesis -
6
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The ANN is designed based on the back-propagation technique so that it can be trained to generate output based on the data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A review of classification techniques for electromyography signals
Published 2023“…All of the ML classifiers have their own algorithm, special specification, pros and cons based on the available input. …”
Get full text
Get full text
Get full text
Article -
8
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…Although the conventional algorithm, MMSE, outperforms the pro�posed algorithms when the number of pilots increased but it is not applicable in real transmission as it is required prior knowledge about the channel statistic which is not the case with DL-based estimators which rely only on the pilots. …”
Get full text
Get full text
Thesis -
9
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
11
Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach
Published 2021Get full text
Get full text
Conference or Workshop Item -
12
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
Get full text
Get full text
Monograph -
13
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
14
Data normalization techniques in swarm-based forecasting models for energy commodity spot price
Published 2014“…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
17
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…The hypothesis is that the tendency of normalization technique to simplify the data combined with the accuracy of the neighborhood models can improve the accuracy of the RS. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis
