Search Results - (( deviation detection method algorithm ) OR ( using vectorization learning algorithm ))
Search alternatives:
- deviation detection »
- using vectorization »
- learning algorithm »
- method algorithm »
-
1
Feature extraction and supervised learning for volatile organic compounds gas recognition
Published 2023“…This research project aims to investigate effective feature extraction techniques that can be employed as discriminative features for machine learning algorithms. A preliminary dataset was used to predict VOC classification through the application of five supervised machine learning algorithms: k-Nearest Neighbors (kNN), Random Forest (RF), Support Vector Machines (SVM), Logistic Regression (LR), and Artificial Neural Networks (ANN). …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Integrating Phq-9 Sentiment Analysis and Clinical Interviews for Depression Detection in Medical Students
Published 2026thesis::master thesis -
3
Assessment of near-infrared and mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm plantation
Published 2013“…The limitations of current detection technique have led to an interest in developing alternative field-based methods that can be used for rapid diagnosis of this disease. …”
Get full text
Get full text
Thesis -
4
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
Get full text
Get full text
Get full text
Article -
5
Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr...
Published 2024“…For water level prediction, lagged rainfall and water level are used. In this study, we used extreme learning machine (ELM)-multi-kernel least square support vector machine (ELM-MKLSSVM), extreme learning machine (ELM)-LSSVM-polynomial kernel function (PKF) (ELM-LSSVM-PKF), ELM-LSSVM-radial basis kernel function (RBF) (ELM-LSSVM-RBF), ELM-LSSVM-Linear Kernel function (LKF), ELM, and MKLSSVM models to predict water level. …”
Article -
6
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
8
Support directional shifting vector: A direction based machine learning classifier
Published 2021“…In this article, we have focused on developing a model of angular nature that performs supervised classification. Here, we have used two shifting vectors named Support Direction Vector (SDV) and Support Origin Vector (SOV) to form a linear function. …”
Get full text
Get full text
Get full text
Article -
9
Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China
Published 2024“…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
Article -
10
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
11
-
12
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
13
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…In machine learning, there are three type of learning branch that can used in classification procedures for data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
Sentiment Analysis on COVID-19 Vaccine Tweets using Machine Learning and Deep Learning Algorithms
Published 2023“…Machine learning algorithms like Logistic Regression, Naïve Bayes, Support Vector Machine (SVM) and others, and Deep Learning algorithms like LSTM and Bert were used to train the predictive models. …”
Get full text
Get full text
Article -
17
Sentiment Analysis on COVID-19 Vaccine Tweets using Machine Learning and Deep Learning Algorithms
Published 2023“…Machine learning algorithms like Logistic Regression, Naïve Bayes, Support Vector Machine (SVM) and others, and Deep Learning algorithms like LSTM and Bert were used to train the predictive models. …”
Get full text
Get full text
Article -
18
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The advisory system algorithm used process history based method and presented by rule-based approach. …”
Get full text
Get full text
Thesis
