Search Results - (( data detection using algorithm ) OR ( parallel estimation method algorithm ))*
Search alternatives:
- parallel estimation »
- estimation method »
- method algorithm »
- using algorithm »
- data detection »
-
1
Parallel visualization approach of a 3D heart model
Published 2008“…With this knowledge, we propose improvement to the existing deterministic algorithm. An algorithm for detection of and dealing with the aliasing problem is also suggested Test results show that our proposed combinational deterministic method and the anti aliasing technique improves the system performance by up to 33% compared to other deterministic method using single scalar values.…”
Get full text
Get full text
Conference or Workshop Item -
2
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Offline on the other hand, is a mode where adaptive algorithms cannot estimate the imperfections in parallel with the transmission. …”
Get full text
Get full text
Thesis -
3
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
4
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008“…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…We used data set from 1999 KDD intrusion detection contest.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
10
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Image reconstruction using iterative transpose algorithm for optical tomography
Published 2007“…This paper describes a transpose algorithm for use with an optical tomography system. …”
Get full text
Get full text
Get full text
Article -
13
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004“…An algorithm that definitely can satisfy the objectives is the Dynamic Integrated Systems Optimization and Parameter Estimation (DISOPE) algorithm. …”
Get full text
Get full text
Monograph -
14
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…Clustering algorithms can be used to create an outlier detection procedure in univariate circular data. …”
Get full text
Get full text
Get full text
Article -
15
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
16
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
18
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…This approach that is according to the DNN model reduces irrelevant features in the intrusion detection data sets of CICIDS2017 to improve the accuracy and cluster high-scale data sets. …”
Get full text
Get full text
Thesis -
19
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
Get full text
Get full text
Get full text
Get full text
Article
