Search Results - (( parameter simulation based algorithm ) OR ( data detection using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2024
    “…This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  10. 10

    Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm by Nik Ahmad Farihin, Mohd Zulkifli, Zuriani, Mustaffa, Mohd Herwan, Sulaiman

    Published 2025
    “…The model is trained using the Czech data in Road Damage Dataset RDD2022 from the Crowdsensing-based Road Damage Detection Challenge (CRDDC’2022), with 80% of the data used for training and 20% for validation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…Interaction, or t-way, testing, where t indicates the interaction strength, is an approach to generate test suite for detecting fault due to interaction. In line with the emerging field called Search based Software Engineering, many recently developed t-way strategies have adopted meta-heuristic algorithms as the basis of their implementations such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization Algorithm, Particle Swarm Optimization, Harmony Search and Cuckoo Search, owing their superior performance in term of test size reduction as compared to general computational based strategies, such as General t-way, Test Vector Generator, In Parameter Order General, Jenny, and Automatic Efficient Test Generator. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Article
  14. 14

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Vision-Based Autonomous Vehicle Driving Control System by Isa, Khalid

    Published 2005
    “…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Vision-based autonomous vehicle driving control system by Isa, Khalid

    Published 2005
    “…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data by Qidwai, U., Malik, A.S., Shakir, M.

    Published 2014
    “…The algorithm also utilizes certain statistical features from the EEG signal that are used as features to the classifier logic. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques by Salami, Momoh Jimoh Emiyoka, Sidek, Shahrul Na'im

    Published 2003
    “…Using an autoregressive moving (ARMA) model whose AR parameters are determined by solving high-order Yule-Walker equations (HOYWE) via the singular value decomposition (SVD) algorithm can alleviate this shortcoming. …”
    Get full text
    Get full text
    Get full text
    Article