Search Results - (( data distribution function algorithm ) OR ( data distribution detection algorithm ))
Search alternatives:
- distribution detection »
- function algorithm »
- data distribution »
-
1
-
2
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
Get full text
Get full text
Thesis -
3
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
4
Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering
Published 2011“…K-distribution is known as the best fit probability density function for the radar sea clutter. …”
Get full text
Get full text
Article -
5
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
6
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…However, by changing the distribution of both classes, the original classes distribution that are followed by that particular data will be violated. …”
Get full text
Get full text
Get full text
Thesis -
7
Customized fault management system for low distribution automation system
Published 2008“…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. …”
Get full text
Get full text
Proceeding Paper -
8
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…The work in this thesis is concerned with the development of techniques for the assessment of statistical process control in data that include censored observations. Various regression models with censored data are presented and we concentrate on four competing risks models namely, two parametric Cox’s model that is, Cox’s with Weibull distribution, Cox’s with exponential distribution and two semiparametric Cox’s model with subdistribution function that is, the weighted score function (W) and censoring complete (CC). …”
Get full text
Get full text
Thesis -
9
Power line carrier (PLC) based communication system for distribution automation system
Published 2008“…Supervisory Control and Data Acquisition (SCADA) is integrated with RTU for automatic operating and controlling the distribution system. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…However, most of existing damage detection methods requires reference data which are not always available. …”
Get full text
Get full text
Get full text
Thesis -
11
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Article -
12
Robust Kernel Density Function Estimation
Published 2010“…The distance of observations from the center of data set is incorporated in the formulation of the first outlier detection method in unimodal distribution. …”
Get full text
Get full text
Thesis -
13
-
14
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…The results are then communicated between hardware circuit and simulation circuit for the final conclusion with the properly functional algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
15
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…The proposed solution introduces and integrates ordering constraints along with a submodular energy minimisation function to/with the GC algorithm to enhance performance. …”
Get full text
Get full text
Article -
16
Fault Detection Relevant Modeling of an Industrial Gas Turbine based on Neuro-Fuzzy Approach
Published 2010“…Structure and network weights for the NF model are determined by a synergetic approach – Data clustering and Gradient Descent algorithm. Operation data collected in 10 seconds interval and for one day is used for model training and validation. …”
Get full text
Conference or Workshop Item -
17
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The HHT is a way to decompose a signal into intrinsic mode functions (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
18
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from the data plane that offers better features and functionalities to detect and deal with those security threats. …”
Get full text
Get full text
Thesis -
19
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
Get full text
Get full text
Article -
20
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
Get full text
Get full text
Get full text
Article
