Search Results - (( data normalization based algorithm ) OR ( based evaluation method algorithm ))

Refine Results
  1. 1

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Materials and Methods: NTCP values from BIOPLAN software is calculated based on standard DVH data. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…We call this method Dynamic Robust Bootstrap-LTS based (DRBLTS) because here we have employed the LTS estimator in the modified bootstrap algorithm. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…It successes to eliminate the mathematical and algorithm problems. Furthermore, the evaluation of proposed method based on the fused image quality. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  7. 7

    A clustering-based method for outlier detection under concept drift by Tahir, Mahjabeen, Abdullah, Azizol, Udzir, Nur Izura, Kasmiran, Khairul Azhar

    Published 2024
    “…However, challenges may arise from assuming the majority of data comprises normal instances, particularly during sudden spikes in attack data, potentially diminishing algorithm effectiveness. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Accordingly, the aim of this research is to address the deficiency of the broadcasting method at route request stage. To overcome the issues related to the broadcasting method, several routing algorithms have been proposed over the Ad hoc on demand Distance Vactor (AODV) such as Neighbor Coverage-Based Probabilistic Rebroadcast (NCPR). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…Variation in evaluation method will not give similar findings even same data is used. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Monitoring the impacts of drought on land use/cover: a developed object-based algorithm for NOAA AVHRR time series data by Mokhtari, Ahmad, Mansor, Shattri, Mahmud, Ahmad Rodzi, Mohd Shafri, Helmi Zulhaidi

    Published 2011
    “…As a novel idea in this study, it developed a new object-based classification algorithm for AVHRR (Advanced Very High Resolution Radiometer) data. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques by Khammar, Mohammad Reza

    Published 2015
    “…In order to remove blotches from digitized old archives, two steps are necessary:detection of the position of blotches and restoration of the missing data. Regarding the detection, a post processing method based on a combination of pixel-based and objects-based methods was proposed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…Performance results show that the MADE algorithm based on lead-acid battery has a high level of LLP and minimum cost among other types of storage batteries. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  18. 18

    Anomaly-based intrusion detection through K-means clustering and naives Bayes classification by Mohamed Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md. Nasir

    Published 2013
    “…K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior, i.e. , i.e. normal and attack, while Naïve Bayes Classifier (NBC) is applied to reorder the misclassified clustered data into correct categories. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate.We propose an integrated machine learning algorithm across K-Mean s clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks.K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior,i.e.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…Using only these 22% labeled training data, our proposed algorithm was able to classify the remaining 78% of the database into 16 classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article