Search Results - (( data normalization based algorithm ) OR ( data identification based algorithm ))

Refine Results
  1. 1
  2. 2

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The ANN is designed based on the back-propagation technique so that it can be trained to generate output based on the data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks by Abualsaud, Khalid, Mahmuddin, Massudi, Saleh, Mohammad, Mohamed, Amr

    Published 2014
    “…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…Previous researchers normally select the IMF visually, based on the user’s experience, and introduced a merit index that allows the automatic selection of the IMF. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The developed algorithm is verified with dedicated testing data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…A novel work has been done in producing simulated data based on empirical models of the real waveforms. …”
    Get full text
    Get full text
    Article
  9. 9

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
    Get full text
    Get full text
    Monograph
  10. 10

    The largest studentized residual test for bad data identification in state estimation of a power system by Khan, Z., Razali, R.B., Daud, H., Nor, N.M., Firuzabad, M.F.

    Published 2015
    “…Based on LSR test, a comprehensive strategy is developed for detection and identification of multiple gross errors which may exist simultaneously in the data. …”
    Get full text
    Get full text
    Article
  11. 11

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…In this thesis, a new quaternion gradient based adaptive algorithm for FIR adaptive filter is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  13. 13

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…A novel work has been done in producing simulated data based on empirical models of the real waveforms. …”
    Get full text
    Get full text
    Citation Index Journal
  14. 14

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…This research addressed severe contamination or occlusion presence in a face recognition based on image data. A modified version of the existing least trimmed square, LTS method with genetic algorithm (LTS with GAs) was proposed to cater the problem of noise or occlusion and improve the performance of face recognition. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks by K.S.R, Rao, F. D., Zahlay

    Published 2008
    “…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…Due to its stochastic nature, the algorithm does not inherit the numerical problems posed by the LLS algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20