Search Results - (( data detection method algorithm ) OR ( variable generation using algorithm ))

Refine Results
  1. 1

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
    Get full text
    Get full text
    Article
  4. 4

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…Faults considered in the research are sensor faults, valve faults and controller faults generated in the fault data (OC). Shewhart Control Chart and Range Control Chart together with the developed correlation coefficients are used for fault detection and diagnosis. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines by Tahan, M., Muhammad, M., Abdul Karim, Z.A.

    Published 2017
    “…Two back-propagation training algorithms, namely the Levenberg–Marquardt and Bayesian regularization algorithms, and the k-fold cross-validation technique, were employed to train the optimal networks using a training data set. …”
    Get full text
    Get full text
    Article
  8. 8

    Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke by Henry Friday , Nweke

    Published 2019
    “…Furthermore, to confirm the performances of the proposed multi-sensor fusion methods using challenging motion sensor data generated using smartphones and wearable sensors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
    Get full text
    Thesis
  12. 12

    Improved robust estimator and clustering procedures for multivariate outliers detection by Sharifah Sakinah, Syed Abd Mutalib

    Published 2023
    “…One of the methods to detect outliers in multivariate data is by using distance-based methods, which is Mahalanobis distance (MD). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…The input and output data were used to create this modeling output variable of the cupping suction system is detected by connecting a differential pressure sensor to the cup, while the input variable is determined by the speed of the pump applied in various locations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW by Sadeghi, Mir Bahram H.

    Published 1996
    “…Also, it was found that scanning of a certain region of the captured image in front of the weld puddle decreases the data processing time drastically. In continuation of this work, a cascade control system for control of welding velocity as well as an algorithm for off·line generation and control of weld 3-D trajectory was developed.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…A generated data where the failure times are taken as exponentially distributed are used to further compare these two parametric models. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Advanced neural networking and classification techniques for human brain tissues diagnoses: segmenting healthy, cancer affected and edema brain tissues by Falah Ali, Wadah

    Published 2019
    “…Especially, in this work MRI images are used to diagnose tumor in the brain. However, the huge amount of data generated by MRI scan thwarts manual classification of tumor vs non-tumor in a particular time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis