Search Results - (( pattern detection method algorithm ) OR ( using simulation modified algorithm ))
Search alternatives:
- simulation modified »
- pattern detection »
- method algorithm »
-
1
Reservoir inflow forecasting with a modified coactive neuro-fuzzy inference system: a case study for a semi-arid region
Published 2018“…The modification also aids in constructing an integrated model that is able to not only detect the nonlinearity in the training data but also the wide range of features within the training data records used to simulate the forecasting model. …”
Get full text
Get full text
Article -
2
A coded aperture-based 3D SPECT imaging system for early breast cancer detection
Published 2023“…Instead of a collimator, this study proposes a coded aperture (CA) based SPECT imaging system where a mask is attached to a typical clinical gamma camera. This imaging method investigates different patterns of the Modified Uniformly Redundant Array (MURA) masks and mosaic MURA masks by a simulating point source, planar source, and the 3D realistic anthropomorphic female breast phantom. …”
Get full text
Get full text
Get full text
Thesis -
3
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…A simulation data using subdistribution function for the two types of failure are carried out to compare the performance of the modified model. …”
Get full text
Get full text
Thesis -
4
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
7
-
8
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
9
Optimized clustering with modified K-means algorithm
Published 2021“…Testing on real data sets showed consistency results as the simulated ones. Generally, the proposed modified k-means algorithm is able to determine the optimum number of clusters for huge data.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
11
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
13
A Modified Simulated Kalman Filter Optimizer with State Measurement, Substitution Mutation, Hamming Distance Calculation, and Swap Operator
Published 2021“…The simulated Kalman filter (SKF) is an algorithm for population-based optimization based on the Kalman filter framework. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph -
15
Comparison of path planning in simulated robot
Published 2020“…There are 4 path planning algorithms will be compared, which are Dijkstra’s algorithm, A* algorithm, RapidExploring Random Tree (RRT) algorithm, and the last one is an algorithm modified from A*. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Estimation of the denitrification in the lower Mississippi Valley
Published 2001“…The CREAMS denitrification algorithm was modified to account for the high soil moisture conditions by incorporating a water function.The average annual denitrification value simulated by using modified algorithm was higher than the one predicted by CREAMS algorithm.This result is expected because the modified algorithm uses a water function to reflect the degree of soil saturation.…”
Get full text
Get full text
Conference or Workshop Item -
17
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
Get full text
Get full text
Thesis
