Search Results - (( data detection method algorithm ) OR ( parallel estimation using algorithm ))
Search alternatives:
- parallel estimation »
- method algorithm »
- using algorithm »
- data detection »
-
1
Parallel visualization approach of a 3D heart model
Published 2008“…With this knowledge, we propose improvement to the existing deterministic algorithm. An algorithm for detection of and dealing with the aliasing problem is also suggested Test results show that our proposed combinational deterministic method and the anti aliasing technique improves the system performance by up to 33% compared to other deterministic method using single scalar values.…”
Get full text
Get full text
Conference or Workshop Item -
2
Forward masking threshold estimation using neural networks and its application to parallel speech enhancement
Published 2010“…Moreover, a parallel implementation of the speech enhancement algorithm was developed using Matlab parallel computing toolbox.…”
Get full text
Get full text
Get full text
Article -
3
A parallel genetic algorithm-based TSK-Fuzzy system for dynamic car-following modeling
Published 2009“…This paper presents the application of Parallel Genetic Algorithm (PGA)-based Takagi Sugeno Kang (TSK)-Fuzzy approach for dynamic car-following modeling in the traffic simulation software. …”
Get full text
Get full text
Article -
4
New algorithm for gyroless spacecraft angular rate Estimation and its application
Published 2006“…A new algorithm for estimating the angular velocity using quaternion measurements is developed based on the concept of the global optimality resulting when using a centralized or master Kalman filter. …”
Get full text
Get full text
Article -
5
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
Get full text
Get full text
Thesis -
6
-
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
8
A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264
Published 2009“…The proposed hardware accelerator can be used in different disciplines from low bit rate to high bit rate by making a tradeoff between the degree of parallelism or using fast algorithm or a combination of both.…”
Get full text
Get full text
Conference or Workshop Item -
9
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
12
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
13
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
14
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
Get full text
Get full text
Get full text
Thesis -
17
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
18
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
19
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
20
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008“…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
Get full text
Get full text
Get full text
Conference or Workshop Item
