Search Results - (( data evaluation method algorithm ) OR ( data normalization based algorithm ))

Refine Results
  1. 1

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Materials and Methods: NTCP values from BIOPLAN software is calculated based on standard DVH data. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The proposed algorithms were evaluated to test their speed in handling streaming data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  5. 5

    A clustering-based method for outlier detection under concept drift by Tahir, Mahjabeen, Abdullah, Azizol, Udzir, Nur Izura, Kasmiran, Khairul Azhar

    Published 2024
    “…However, challenges may arise from assuming the majority of data comprises normal instances, particularly during sudden spikes in attack data, potentially diminishing algorithm effectiveness. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…Variation in evaluation method will not give similar findings even same data is used. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…We call this method Dynamic Robust Bootstrap-LTS based (DRBLTS) because here we have employed the LTS estimator in the modified bootstrap algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    The new efficient and accurate attribute-oriented clustering algorithms for categorical data by Qin, Hongwu

    Published 2012
    “…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Monitoring the impacts of drought on land use/cover: a developed object-based algorithm for NOAA AVHRR time series data by Mokhtari, Ahmad, Mansor, Shattri, Mahmud, Ahmad Rodzi, Mohd Shafri, Helmi Zulhaidi

    Published 2011
    “…As a novel idea in this study, it developed a new object-based classification algorithm for AVHRR (Advanced Very High Resolution Radiometer) data. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…Using only these 22% labeled training data, our proposed algorithm was able to classify the remaining 78% of the database into 16 classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques by Khammar, Mohammad Reza

    Published 2015
    “…In order to remove blotches from digitized old archives, two steps are necessary:detection of the position of blotches and restoration of the missing data. Regarding the detection, a post processing method based on a combination of pixel-based and objects-based methods was proposed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The first algorithm DCFP outperforms the NCPR algorithm in terms of normalize routing overhead by 11.27%, while maintaining the same packet delivery ratio. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Multi-source data fusion framework for remote triaging and prioritization in telemedicine by Salman, Omar Hussein

    Published 2015
    “…Simulation results, based on datasets for different symptoms of heart diseases,demonstrate the superiority of MSHA algorithms as compared to benchmark algorithms in terms of triaging and prioritizing patients remotely and also in terms of data fusion processing in healthcare application. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Anomaly-based intrusion detection through K-means clustering and naives Bayes classification by Mohamed Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md. Nasir

    Published 2013
    “…K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior, i.e. , i.e. normal and attack, while Naïve Bayes Classifier (NBC) is applied to reorder the misclassified clustered data into correct categories. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate.We propose an integrated machine learning algorithm across K-Mean s clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks.K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior,i.e.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…Secondly, the modeling method of the proposed PV module is validated by experimental data. …”
    Get full text
    Get full text
    Thesis