Search Results - (( wave estimation method algorithm ) OR ( data detection method algorithm ))

Refine Results
  1. 1

    Utilization of canny and velocity bunching algorithms for modelling shoreline change by Marghany, Maged, Hashim, Mazlan

    Published 2006
    “…Edge detection algorithm such as Canny algorithm is implemented to identify shoreline. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks by Mahzan, Shahruddin, J. Staszewski, Wieslaw, Worden, Keith

    Published 2010
    “…The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improved static and dynamic FBG sensor system for real-time monitoring of composite structures by Vorathin, Epin

    Published 2017
    “…The voltage normalization algorithm has reduced the output voltage variations from 26 data/minute to 17 data/minute with the elimination of pre-calibration each time before use. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Peramalan Isyarat Satelit Menggunakan Kaedah Rangkaian Neural by Kahar, Nur Farhan

    Published 2006
    “…This project has produced a neural network system that achieves 91.7% accuracy through the use of Bayesian Regularization algorithm. Thus, we can say that the system is able to make an accurate and convincing estimation. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Estimation of Response Transfer Functions of Offshore Structures Using the Time-Varying ARX Model by Yazid, Edwar, Liew, M. S., Parman, Setyamartana, Kurian, V.J.

    Published 2013
    “…The proposed approach outlined here has shown the tremendous potential in the estimation of transfer function. The results indicate that TVARX model produces accurate, smooth and less noise TF estimates over DFT method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Seismic wave modeling and high-resolution imaging by Bashir, Y., Ghosh, D.P., Alashloo, S.Y.M.

    Published 2022
    “…The wave-modeling and imaging algorithm is implemented on two velocity models: the Marmousi model and the Sigsbee model. …”
    Get full text
    Get full text
    Book
  8. 8

    Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam, Gomes, Chandima

    Published 2016
    “…The proposed method can be helpful for creating lightning location and lightning current data banks as it can estimate the full shape of the current as opposed to the usual methods used previously.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  14. 14

    Performance of DOA estimation algorithms for acoustic localization of indoor flying drones using artificial sound source by Syaril, Azrad, Salman, Abdulaziz, Al-Haddad, Syed Abdul Rahman

    Published 2024
    “…The strategy is simulated to assess localization performance of three different types of chirping sounds indoors using six microphone arrays. The estimated direction of arrival (DOA) of the chirping sound is calculated using several published algorithms that include MUSIC, CSSM, SRP-PHAT, TOPS and WAVES. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Estimating the direction of arrival of the multipath radio signal using Capon technique / Haslinah Ruslan by Ruslan, Haslinah

    Published 1996
    “…To overcome the problem, Capon method is introduced. Capon method provides high resolution estimation of the DOA of the multipath radio signals. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    k- Nearest Neighbor Algorithm For Improving Accuracy In Clutter Based Location Estimation Of Wireless Nodes by Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Patrice Boursier, Shahrulniza Musa

    Published 2013
    “…This research is focusing on the precise location estimation of mobile node by using k - nearest neighbor algorithm (k-NN). …”