Search Results - (( data detection method algorithm ) OR ( data equalization based algorithm ))

Refine Results
  1. 1

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  2. 2

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  3. 3

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  4. 4

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The highest accuracy is 78.33% ofthe 10-fold Cross Validation method are found in data is 80% training and 20% testing when k is equal to 5. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…Data level based methods are meant to solve the imbalanced classification problem based on the idea of making both classes equal in number. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Improved robust estimator and clustering procedures for multivariate outliers detection by Sharifah Sakinah, Syed Abd Mutalib

    Published 2023
    “…One of the methods to detect outliers in multivariate data is by using distance-based methods, which is Mahalanobis distance (MD). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced image segmentation in thermal infrared image processing for faulty detection on broadcasting equipment / Mohd Rizman Sultan Mohd, Sukreen Hana Herman and Zaiton Sharif by Mohd, Mohd Rizman Sultan, Herman, Sukreen Hana, Sharif, Zaiton

    Published 2018
    “…This study is carried out in the radio broadcasting studio which monitor the equipment through the operation time period. The data gathered from the system will undergo enhanced image segmentation method using k-means clustering with the implementation of histogram equalization for further image processing algorithm to detect the presence of hot spot. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…In order to reduce the training time and computational cost of the algorithm, Principal Components Analysis (PCA) pretraining strategy is deployed to obtain data adaptive filter banks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Automated fault detection and extraction under gas chimneys using hybrid discontinuity attributes by Imran, Q.S., Siddiqui, N.A., Latiff, A.H.A., Bashir, Y., Khan, M., Qureshi, K., Al-Masgari, A.A.-S., Ahmed, N., Jamil, M.

    Published 2021
    “…3D-seismic data have increasingly shifted seismic interpretation work from a horizons-based to a volume-based focus over the past decade. …”
    Get full text
    Get full text
    Article
  12. 12

    Radiomics analysis and supervised machine learning model for classification of cervical cancer images using diffusion weighted imaging-MRI by Ramli, Zarina

    Published 2024
    “…Additionally, the SVM algorithm was evaluated based on its performance across different DWI bvalues, aiming to optimize scanning time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  14. 14

    The development of Muscle Fatigue Prediction model from muscle torque and contraction data / Keshasni Earichappan by Keshasni , Earichappan

    Published 2023
    “…This study aims to develop a prediction model to predict muscle fatigue levels (100%-75%, 75%-50%, 50%-25%, 25%-0%) from muscle contraction and torque using Levenberg Marquardt algorithm. This study starts with the collection of data on muscle contraction(mV) and torque (Nm) based on six healthy subjects doing isokinetic knee extension. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis