Search Results - (( wave estimation method algorithm ) OR ( data detection method algorithm ))
Search alternatives:
- estimation method »
- method algorithm »
- wave estimation »
- data detection »
-
1
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…Edge detection algorithm such as Canny algorithm is implemented to identify shoreline. …”
Get full text
Get full text
Conference or Workshop Item -
2
Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks
Published 2010“…The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
Get full text
Get full text
Get full text
Article -
3
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
4
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…The voltage normalization algorithm has reduced the output voltage variations from 26 data/minute to 17 data/minute with the elimination of pre-calibration each time before use. …”
Get full text
Get full text
Thesis -
5
Peramalan Isyarat Satelit Menggunakan Kaedah Rangkaian Neural
Published 2006“…This project has produced a neural network system that achieves 91.7% accuracy through the use of Bayesian Regularization algorithm. Thus, we can say that the system is able to make an accurate and convincing estimation. …”
Get full text
Get full text
Monograph -
6
Estimation of Response Transfer Functions of Offshore Structures Using the Time-Varying ARX Model
Published 2013“…The proposed approach outlined here has shown the tremendous potential in the estimation of transfer function. The results indicate that TVARX model produces accurate, smooth and less noise TF estimates over DFT method. …”
Get full text
Get full text
Conference or Workshop Item -
7
Seismic wave modeling and high-resolution imaging
Published 2022“…The wave-modeling and imaging algorithm is implemented on two velocity models: the Marmousi model and the Sigsbee model. …”
Get full text
Get full text
Book -
8
Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations
Published 2016“…The proposed method can be helpful for creating lightning location and lightning current data banks as it can estimate the full shape of the current as opposed to the usual methods used previously.…”
Get full text
Get full text
Conference or Workshop Item -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
10
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
13
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
14
Performance of DOA estimation algorithms for acoustic localization of indoor flying drones using artificial sound source
Published 2024“…The strategy is simulated to assess localization performance of three different types of chirping sounds indoors using six microphone arrays. The estimated direction of arrival (DOA) of the chirping sound is calculated using several published algorithms that include MUSIC, CSSM, SRP-PHAT, TOPS and WAVES. …”
Get full text
Get full text
Get full text
Article -
15
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
16
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Estimating the direction of arrival of the multipath radio signal using Capon technique / Haslinah Ruslan
Published 1996“…To overcome the problem, Capon method is introduced. Capon method provides high resolution estimation of the DOA of the multipath radio signals. …”
Get full text
Get full text
Thesis -
18
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
The potential of shear wave velocity as an erosion risk index
Published 2022“…Therefore, this study aims to develop a relation between ROM scale and shear wave velocity estimated by the spectral-analysis-of-surface-waves (SASW) method. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
k- Nearest Neighbor Algorithm For Improving Accuracy In Clutter Based Location Estimation Of Wireless Nodes
Published 2013“…This research is focusing on the precise location estimation of mobile node by using k - nearest neighbor algorithm (k-NN). …”
