Search Results - (( probable detection method algorithm ) OR ( normal distribution methods algorithm ))

Refine Results
  1. 1

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The distance of observations from the center of data set is incorporated in the formulation of the first outlier detection method in unimodal distribution. The second method attempts to define an approach that is useable not only for unimodal distribution but also for multimodal distribution. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Microcrack Detection And Noise Reduction In Integrated Circuit Packages by Koh, Ye Sheng

    Published 2018
    “…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection by Algriree, Waleed, Sulaiman, Nasri, Isa, Maryam, Sahbudin, Ratna K. Z., Hassan, Siti L. M., Hmood Salman, Emad, Alghrairi, Mokhalad

    Published 2022
    “…Thus, a 5G-MIMO based CR communication system has been developed to enhance the spectrum by employing a spectrum sensing (SS) algorithm. This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS by Akbari, M., Reza, A.W., Noordin, K.A., Manesh, M.R., Hindia, M.N.

    Published 2014
    “…This paper focuses on optimality of analytical study on the common soft fusion (SDF) CSS based on different iterative algorithms which confirm low total probability of error and high probability of detection in details. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Recent Efficient Iterative Algorithms on Cognitive Radio Cooperative Spectrum Sensing to Improve Reliability and Performance by Akbari, M., Reza, A.W., Noordin, K.A., Dimyati, K., Manesh, M.R., Hindia, M.N.

    Published 2016
    “…This paper focuses on optimality of analytical study on the common soft decision fusion (SDF) CSS based on different iterative algorithms which confirm low total probability of error and high probability of detection in detail. …”
    Get full text
    Get full text
    Article
  8. 8

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…The noise reduction method in the proposed algorithm consists of a combination of a morphological filter and a rejection method. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fault section detection and location on distribution network using analytical voltage sags database by Khalid, A.R., Mokhlis, Hazlie, Li, H.

    Published 2006
    “…By doing this all the possible sections due to the fault can be selected. Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Improved performance in distributed estimation by convex combination of DNSAF and DNLMS algorithms by Ahmad Pouradabi, Amir Rastegarnia, Azam Khalili, Ali Farzamnia

    Published 2022
    “…Diffusion normalized least mean square (DNLMS) algorithm has low misadjustment error, but it is slow in convergence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  11. 11

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Single-linkage method to detect multiple outliers with different outlier scenarios in circular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Roslinazairimah, Zakaria

    Published 2018
    “…Single-linkage is one of the algorithms in agglomerative clustering technique that can be used to detect outliers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    The Multiple Outliers Detection using Agglomerative Hierarchical Methods in Circular Regression Model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Roslinazairimah, Zakaria

    Published 2017
    “…The single-linkage method is one of the simplest agglomerative hierarchical methods that is commonly used to detect outlier. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  15. 15

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant by Al-Neami, F. B., Al-Kayiem, Hussain H.

    Published 2008
    “…The proposed fault diagnosis method combines ANNs, GAs and classical probability with an expert knowledge base. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Statistical approach on grading: mixture modeling by Md. Desa, Zairul Nor Deana

    Published 2006
    “…Statistical approaches which use the Standard Deviation and conditional Bayesian methods are considered to assign the grades. In the conditional Bayesian model, we assume the data to follow the Normal Mixture distribution where the grades are distinctively separated by the parameters: means and proportions of the Normal Mixture distribution. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing by Barakat, Hussein Mohammed

    Published 2016
    “…The better spectrum sensing algorithm would require some trade-off between probability of detection (PD) and the probability of false alarm (PFA) to obtain good accuracy with low noise variance.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…Therefore, this study aims to develop new algorithms that can detect outliers by using minimum spanning tree method. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Applying Bayesian probability for Android malware detection using permission features by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif, Azlee, Zabidi

    Published 2021
    “…This paper proposes a malware detection system based on permission features using Bayesian probability to battle the malware issue. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item