Search Results - (( data equalization based algorithm ) OR ( data detection method algorithm ))
Search alternatives:
- data equalization »
- method algorithm »
- data detection »
-
1
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
2
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
3
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
4
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
5
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The highest accuracy is 78.33% ofthe 10-fold Cross Validation method are found in data is 80% training and 20% testing when k is equal to 5. …”
Get full text
Get full text
Thesis -
6
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Data level based methods are meant to solve the imbalanced classification problem based on the idea of making both classes equal in number. …”
Get full text
Get full text
Get full text
Thesis -
7
Improved robust estimator and clustering procedures for multivariate outliers detection
Published 2023“…One of the methods to detect outliers in multivariate data is by using distance-based methods, which is Mahalanobis distance (MD). …”
Get full text
Get full text
Thesis -
8
Enhanced image segmentation in thermal infrared image processing for faulty detection on broadcasting equipment / Mohd Rizman Sultan Mohd, Sukreen Hana Herman and Zaiton Sharif
Published 2018“…This study is carried out in the radio broadcasting studio which monitor the equipment through the operation time period. The data gathered from the system will undergo enhanced image segmentation method using k-means clustering with the implementation of histogram equalization for further image processing algorithm to detect the presence of hot spot. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…In order to reduce the training time and computational cost of the algorithm, Principal Components Analysis (PCA) pretraining strategy is deployed to obtain data adaptive filter banks. …”
Get full text
Get full text
Get full text
Thesis -
11
Automated fault detection and extraction under gas chimneys using hybrid discontinuity attributes
Published 2021“…3D-seismic data have increasingly shifted seismic interpretation work from a horizons-based to a volume-based focus over the past decade. …”
Get full text
Get full text
Article -
12
Radiomics analysis and supervised machine learning model for classification of cervical cancer images using diffusion weighted imaging-MRI
Published 2024“…Additionally, the SVM algorithm was evaluated based on its performance across different DWI bvalues, aiming to optimize scanning time. …”
Get full text
Get full text
Get full text
Thesis -
13
Development of new code for optical code division multiple access systems
Published 2011“…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
Get full text
Thesis -
14
The development of Muscle Fatigue Prediction model from muscle torque and contraction data / Keshasni Earichappan
Published 2023“…This study aims to develop a prediction model to predict muscle fatigue levels (100%-75%, 75%-50%, 50%-25%, 25%-0%) from muscle contraction and torque using Levenberg Marquardt algorithm. This study starts with the collection of data on muscle contraction(mV) and torque (Nm) based on six healthy subjects doing isokinetic knee extension. …”
Get full text
Get full text
Get full text
Thesis -
15
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…By using real time measurements and historical data base, power system state estimator detects errors in measurements and the data base; and calculates an optimal estimate of the system state vector of the bus voltage magnitudes and angles. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
18
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis
