Search Results - (( model detection method algorithm ) OR ( based instruction ((cell algorithm) OR (_ algorithm)) ))
Search alternatives:
- method algorithm »
- model detection »
- cell algorithm »
-
1
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Design of DNA sequence alignment accelerated system using 2-dimensional array and custom instruction on FPGA / Nur Dalilah Ahmad Sabri
Published 2018“…Thus, this research concentrates on the optimization techniques based on Custom Instruction (CI) and Rectangular Dimensional array (2D) that proposed on Smith-Waterman (SW) algorithm. …”
Get full text
Get full text
Thesis -
3
Heartbeat disease diagnosis using text-based approaches
Published 2011“…Some of them used Artificial Neural Network method for detection and classification of heart sounds. …”
Get full text
Get full text
Thesis -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
5
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
6
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…The accuracy of fake news detection models relies mainly on the quality of the extracted features and the method used in detection. …”
Get full text
Get full text
Get full text
Thesis -
7
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
8
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
Get full text
Get full text
Thesis -
9
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
11
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
Get full text
Get full text
Get full text
Thesis -
12
Model-based hybrid variational level set method applied to lung cancer detection
Published 2024“…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…This study explains in detail how fuzzy modeling works by using FA for detecting phishing. …”
Get full text
Get full text
Get full text
Article -
15
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…However, the challenge of class imbalance and high dimensionality in clinical data significantly impedes the efficacy of Machine Learning (ML) models in this domain. This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
Get full text
Get full text
Get full text
Thesis -
16
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
17
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
18
Single-linkage method to detect multiple outliers with different outlier scenarios in circular regression model
Published 2018“…It is found that the single linkage method performed well in detecting outliers for both outlier scenarios and applicable for circular regression model.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin
Published 2021“…The computation time complexity of the Q-Learning-based test coverage algorithm was also analyzed. …”
Get full text
Get full text
Get full text
Thesis -
20
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
Get full text
Get full text
Thesis
