Search Results - (( data normalization _ algorithm ) OR ( variable extracting based algorithm ))
Search alternatives:
- variable extracting »
- data normalization »
- extracting based »
-
1
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
Get full text
Get full text
Thesis -
2
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…The method obtains ROIs using facial landmarks, then it rectifies illumination based on Normalized Least Mean Square (NLMS) adaptive filter and eliminates non-rigid motions based on standard deviation of fixed length of the signal's segments. …”
Get full text
Get full text
Article -
3
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
Get full text
Get full text
Get full text
Thesis -
4
Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm
Published 2015“…These classification algorithms are trained using the features extracted from the patient data in order for them to learn the relationship between the features and the end-result (FLD present or absent). …”
Get full text
Get full text
Get full text
Article -
5
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…In SPHAD,statistical analysis is used to construct a normal profile using statistical formula, scoring the incoming packets, and computing the relationships between historic normal behaviour as a dependent variable against observable packet behaviours as the independent variable through linear regression. …”
Get full text
Get full text
Thesis -
6
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…The framework analyzes extracted traffic features, including packet length and IP address patterns, to detect deviations from normal behaviour without requiring labelled data. …”
Get full text
Get full text
Get full text
Article -
7
Classification of compressive strength grades for lightweight aggregate concrete with palm oil fuel ash (POFA) using kNearest Neighbour (k-NN)
Published 2023“…The data from this process were first transformed using min-max normalization and then, analysed using exploratory and descriptive analysis to discover patterns between input variables and concrete grades. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Classification of compressive strength grades for lightweight aggregate concrete with palm oil fuel ash (POFA) using k-Nearest Neighbour (k-NN)
Published 2023“…The data from this process were first transformed using min-max normalization and then, analysed using exploratory and descriptive analysis to discover patterns between input variables and concrete grades. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Classification for large number of variables with two imbalanced groups
Published 2020“…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…If the feature extraction process fails to capture the correct information, the performance or accuracy of the classification algorithm will be negatively impacted. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Development Of Fall Risk Clustering Algorithm In Older People
Published 2020“…Therefore, the aim of this study is to develop a clustering-based fall risk algorithm which can provide assistances for clinician in management of falls. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Effect of normalization and effect of normalization and training algorithm on radial basis training algorithm on radial basis function network performance function network performa...
Published 2007“…To recognize the effect of normalization of data and training algorithm on Radial Basis Function (RBF) performance.…”
Get full text
Get full text
Conference or Workshop Item -
13
Optimized clustering with modified K-means algorithm
Published 2021“…In dealing with correlated variables, PCA was embedded in the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
Get full text
Get full text
Thesis -
17
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
18
Development of an effective clustering algorithm for older fallers
Published 2022“…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. Data from the Malaysian Elders Longitudinal Research (MELoR), comprising 1411 subjects aged ≥55 years, were utilized. …”
Get full text
Get full text
Article -
19
-
20
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis
