Search Results - (( data distribution function algorithm ) OR ( data detection method algorithm ))

Refine Results
  1. 1
  2. 2

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…However, most of existing damage detection methods requires reference data which are not always available. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…Algorithmic level based methods however are based on introducing new optimization task to improve the minority class classification rate, without changing the data characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering by Davari, Atefeh, Marhaban, Mohammad Hamiruce, Mohd Noor, Samsul Bahari, Karimadini, Mohammad, Karimoddini, Ali

    Published 2011
    “…Although the number of these target-like data is small, they may cause false alarm and perturb the target detection. …”
    Get full text
    Get full text
    Article
  6. 6

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…However, the weighted score function (W) shows better result compared to the censored complete data (CC). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The distance of observations from the center of data set is incorporated in the formulation of the first outlier detection method in unimodal distribution. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…The proposed solution introduces and integrates ordering constraints along with a submodular energy minimisation function to/with the GC algorithm to enhance performance. …”
    Get full text
    Get full text
    Article
  13. 13

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…All the hype surrounding the SDNs is predominantly because of its centralized management functionality, the separation of the control plane from the data forwarding plane, and enabling innovation through network programmability. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Remotely sensed imagery data application in mangrove forest: a review by Abdul Whab @ Abdul Wahab, Zulfa, Kamarudin, Norizah

    Published 2018
    “…All types of measurements related to the mangrove forest ecosystem, such as detection of land cover changes, species distribution mapping and disaster observation should take advantage of the advanced technology; for example, adopting the digital image processing algorithm coupled with high-resolution image available nowadays. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Pipe Leak Diagnostic Using High Frequency Piezoelectric Pressure Sensor And Automatic Selection Of Intrinsic Mode Function by Hanafi, M. Yusop, M. F., Ghazali, M. F. M., Yusof, Remli, M. A. Pi, M. H., Kamarulzaman

    Published 2017
    “…In a recent study, the analysis of pressure transient signals could be seen as an accurate and low-cost method for leak and feature detection in water distribution systems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis