Search Results - (( rule detection method algorithm ) OR ( based simulation based algorithm ))*
Search alternatives:
- method algorithm »
- based simulation »
- simulation based »
- rule detection »
-
1
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
3
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The advisory system algorithm used process history based method and presented by rule-based approach. …”
Get full text
Get full text
Thesis -
5
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
6
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. …”
Get full text
Get full text
Get full text
Thesis -
7
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
8
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Power quality problem classification based on Wavelet Transform and a Rule-Based method
Published 2010“…This paper describes a Wavelet Transform and Rule-Based method for detection and classification of various events of power quality disturbances. …”
Get full text
Get full text
Conference or Workshop Item -
10
Power Quality Problem Classification Based on Wavelet Transform and a Rule-Based method
Published 2010“…This paper describes a Wavelet Transform and Rule-Based method for detection and classification of various events of power quality disturbances. …”
Get full text
Get full text
Conference or Workshop Item -
11
Power Quality Problem Classification Based on Wavelet Transform and a Rule-Based method
Published 2010“…This paper describes a Wavelet Transform and Rule-Based method for detection and classification of various events of power quality disturbances. …”
Get full text
Get full text
Conference or Workshop Item -
12
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
13
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…This thesis focuses on a Rule-Based method based on wavelet transform to detect and classify various events of power quality disturbances. …”
Get full text
Get full text
Thesis -
14
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…iii The summarizing strategies identification module relies on a set of heuristic rules, statistical and linguistic methods such as position-based method, title-based method, cue-phrase method and word-frequency method to identify the summarizing strategies employed by students. …”
Get full text
Get full text
Thesis -
15
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Later, we assess the performance of confidence interval for error concentration parameter for the new functional relationship model via simulation study. Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
16
Preliminary study of pneumonia symptoms detection method using cellular neural network
Published 2011Get full text
Working Paper -
17
Engine fault diagnosis using probabilistic neural network
Published 2021“…A benchmarked engine fault model is developed and simulated in Maltab. The proposed algorithm is designed to detect 9 common engine faults based on the information extracted from exhaust gas, such as hydrocarbon (HC), carbon monoxide (CO), oxides of nitrogen (NOx), carbon dioxide (CO2) and dioxygen (O2). …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
18
Study of carbon black-epoxy based fat tissue phantom and its dielectric properties / Hatem Mohamed Abdelwahab Al-Gabroun
Published 2010“…For this purpose several phantoms with several materials have been proposed to simulate bio logical tissues. This study investigates a simulation method based on rule of mixture to design fat phantom by using binary system containing epoxy as a matrix and carbon black powder as a filler. …”
Get full text
Get full text
Thesis -
19
-
20
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article
