Search Results - (( data detection method algorithm ) OR ( parameters variation methods algorithm ))
Search alternatives:
- parameters variation »
- variation methods »
- methods algorithm »
- method algorithm »
- data detection »
-
1
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
2
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…Significance: The proposed method is simple and robust against individual variations in the PPG characteristics, thus making it suitable for a diverse range of datasets. …”
Get full text
Get full text
Article -
3
Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT
Published 2019“…This brings the need for Sensor Fault Detection and eliminate this potential fault. This thesis proposes to design a Faulty Sensor Detection Mechanism using the data correlation method of multivariate sensors. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
Get full text
Get full text
Thesis -
5
-
6
Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW
Published 1996“…These equations were developed from the statistical regression analysis of 80 welds deposited using various combinations of welding parameters. For monitoring of workpiece thickness variations, an ultrasonic device was used. …”
Get full text
Get full text
Thesis -
7
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
Get full text
Get full text
Thesis -
8
Developing individualised therapy for colistin through application of pharmacokinetic model tailored for critically ill Malaysian patients utilizing the HPLC-FLD
Published 2025“…The high-performance liquid chromatography with fluorescence detection (HPLC-FLD) method was developed and validated to measure colistin in human serum. …”
Get full text
Get full text
Thesis -
9
Design of low order quantitative feedback theory and H-infinity-based controllers using particle swarm optimisation for a pneumatic actuator system
Published 2010“…These algorithms are designed to achieve the robustness over a wide range of system parameters change and disturbances. …”
Get full text
Get full text
Thesis -
10
Hybrid Control of A Quadrotor System Carrying Suspended Payload With Parameter Variations
Published 2025thesis::master thesis -
11
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
12
Voltage Variation Analysis By Using Gabor Transform
Published 2019“…The parameters extracted can detect the voltage variation signals successfully. …”
Get full text
Get full text
Get full text
Article -
13
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
16
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
17
-
18
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
19
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Model-based hybrid variational level set method applied to lung cancer detection
Published 2024“…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
Get full text
Get full text
Get full text
Article
