Search Results - (( linear interpolation method algorithm ) OR ( pattern detection method algorithm ))
Search alternatives:
- linear interpolation »
- interpolation method »
- pattern detection »
- method algorithm »
-
1
A hermite interpolated LUT for RF power amplifiers
Published 2017“…The algorithm employs the hermite interpolation LUT, which has a higher accuracy of interpolation. …”
Get full text
Get full text
Get full text
Article -
2
Solving fractional differential equations using fractional explicit method
Published 2024“…Most of the numerical methods for solving FDEs involved the interpolating points of step size ℎ. …”
Get full text
Get full text
Get full text
Article -
3
Solving fractional differential equations using fractional explicit method
Published 2024“…Most of the numerical methods for solving FDEs involved the interpolating points of step size ℎ. …”
Get full text
Get full text
Article -
4
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Multistep block methods for solving higher order delay differential equations
Published 2016“…The delay term in DDEs with constant delays is approximated using Hermite interpolation. Linear and Hermite interpolators are used to approximate the delay terms in DDEs of pantograph type. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
8
-
9
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
10
Image Fusion for Travel Time Tomography Inversion
Published 2015“…Firstly, the shortest path method and the linear travel time interpolation were used for forward calculation; then combined the improved Wilkinson iteration method with super relaxation precondition method to reduce the condition number of matrix and accelerate iterative speed, the precise integration method was used to solve the inverse matrix more precisely in tomography inversion process; finally, use wavelet transform for image fusion, obtain the final image. …”
Get full text
Get full text
Article -
11
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
12
Use of the simplex method to optimize analytical condition in structural analysis
Published 2011“…The nonlinear behavior is approximated as a sequence of successively changing linear systems over a short time interval. Solution of nonlinear equations needs to iterative method such as Iterative algorithm. …”
Get full text
Article -
13
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Formulation of a new implicit method for group implicit BBDF in solving related stiff ordinary differential equations
Published 2021“…The proposed solver satisfied theoretical consistency and zero-stable requirements, leading to a convergent multistep method with third algebraic order. We used the well-known and standard linear and nonlinear stiff IVP problems used in literature for validation to measure the algorithm's accuracy and processor time efficiency. …”
Get full text
Get full text
Get full text
Article -
15
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
Get full text
Get full text
Thesis -
16
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
Get full text
Get full text
Get full text
Article -
17
Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm
Published 2019“…Viola-Jones algorithm can be categorized as one of an established and effective method (feature-based approach) for detecting face. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
19
Cabbage disease detection system using k-NN algorithm
Published 2022“…Then, the segmented cabbage sample will use the GLCM method for feature extraction. It is a method of extracting second-order statistical texture features to detect diseases more efficiently. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item
