Search Results - (( process information using algorithm ) OR ( variable detection method algorithm ))
Search alternatives:
- process information »
- variable detection »
- information using »
- method algorithm »
- using algorithm »
-
1
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
2
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
3
Fault detection and diagnosis for gas density monitoring using multivariate statistical process control
Published 2011“…Results show that method based on PCA and PCorrA was able to detect the pre-designed faults successfully and identify variables which cause the faults.…”
Get full text
Get full text
Get full text
Article -
4
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
5
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
Get full text
Get full text
Thesis -
6
Predicting Survey Responses: How and Why Semantics Shape Survey Statistics on Organizational Behaviour
Published 2014“…Some disciplines in the social sciences rely heavily on collecting survey responses to detect empirical relationships among variables. We explored whether these relationships were a priori predictable from the semantic properties of the survey items, using language processing algorithms which are now available as new research methods. …”
Get full text
Get full text
Get full text
Article -
7
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
8
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
Get full text
Get full text
Get full text
Article -
9
Gene Selection For Cancer Classification Based On Xgboost Classifier
Published 2022“…Due to this situation, development of the gene selection method has become more important in obtain useful information for cancer classification, and diagnoses for other diseases. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Power System State Estimation In Large-Scale Networks
Published 2010“…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
Get full text
Get full text
Thesis -
11
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
12
Rapid and non-destructive monitoring of the drying process of glutinous rice using visible-near infrared hyperspectral imaging
Published 2025“…The best performance accuracy (RP2≥99.99░%)was obtained when the SG1D and Gaussian process regression (GPR) model were combined with iteratively retained informative variable algorithm (SG1D-IRIV-GPR), variable iterative space shrinkage (SG1D-VISSA-GPR) and variable combination population analysis (SG1D-VCPA-GPR) for the prediction of MC, GI, and ΔE, respectively. …”
Get full text
Get full text
Get full text
Article -
13
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
14
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
Get full text
Learning Object -
15
AI Adoption for Steam Boiler Trip Prevention in Thermal Power Plants
Published 2025“…These findings collectively emphasize the potential of AI-driven methods in enhancing early detection and prevention of boiler trips, thereby contributing to improved operational safety and efficiency. ?…”
Article -
16
An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction
Published 2023“…In the third method, a hybrid algorithm called LSTM-C-EST, which is a combination of Fuzzy-MDL and LSTM-C is proposed. …”
Get full text
Get full text
Get full text
Thesis -
17
On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models
Published 2023“…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
Get full text
Get full text
Get full text
Article -
18
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The results obtained from the simulation study and real data sets indicate that the proposed method possesses high detection power with minimal misclassification error compared to the MRCD and MDP methods. …”
Get full text
Get full text
Thesis -
19
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
20
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis
