Search Results - (( data identification using algorithm ) OR ( data normalization based algorithm ))

Refine Results
  1. 1

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…Unlike the commercial ECG simulators, to the best of our knowledge, there is no such commercially available system that can be used for such research tasks. With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The ANN is designed based on the back-propagation technique so that it can be trained to generate output based on the data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The proposed algorithm is capable of processing the generality of quaternion and complex data signals in both noisy and noise-free environments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  7. 7

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…Unlike the commercial ECG simulators, to the best of our knowledge, there is no such commercially available system that can be used for such research tasks. With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Citation Index Journal
  8. 8

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…Previous researchers normally select the IMF visually, based on the user’s experience, and introduced a merit index that allows the automatic selection of the IMF. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The developed algorithm is verified with dedicated testing data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks by Abualsaud, Khalid, Mahmuddin, Massudi, Saleh, Mohammad, Mohamed, Amr

    Published 2014
    “…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The algorithms are developed using MATLABTM software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsTM, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The algorithms are developed using MATLAB software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytems, and the spectra of the fault data are analyzed using fast Fourier transform to extract features of each type of fault. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    The largest studentized residual test for bad data identification in state estimation of a power system by Khan, Z., Razali, R.B., Daud, H., Nor, N.M., Firuzabad, M.F.

    Published 2015
    “…The chi-square and normalized residual tests are the common post estimation procedures usually used for detection and identification of gross errors in the estimation algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks by K.S.R, Rao, F. D., Zahlay

    Published 2008
    “…The algorithms are developed using MATLABâ„¢ software. A range of faults are simulated on EHV modeled transmission line using SimPowerSytemsâ„¢, and the spectra of the fault data are analyzed using fast Fourier transform which facilitates extraction of distinct features of each type of fault. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…This research addressed severe contamination or occlusion presence in a face recognition based on image data. A modified version of the existing least trimmed square, LTS method with genetic algorithm (LTS with GAs) was proposed to cater the problem of noise or occlusion and improve the performance of face recognition. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods by Chin, Ying Teh, Tay, Kai Meng, Chee, Peng Lim

    Published 2017
    “…The same observation can be made, empirically, using a system identification method, e.g., a derivative–based optimization method and the genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20