Search Results - (( deviation detection method algorithm ) OR ( variable detection using algorithm ))

Refine Results
  1. 1

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  4. 4

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…The advisory system algorithm used process history based method and presented by rule-based approach. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process variables are defined as fault if they are deviated outside this region. …”
    Get full text
    Get full text
    Article
  6. 6

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…Also, it indicates that our algorithm can be used for the online environment. Finally, the application of our algorithm in search and rescue scenarios using drones is considered and an experiment is conducted to investigate the algorithm's potential to be embedded in drones.…”
    Get full text
    Get full text
    Article
  8. 8

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad by Ahmad, Siti Arpah

    Published 2017
    “…Thus, this work investigates the role of sharpening and AHE based image enhancement in reducing variability among the evaluation. New rule using existing standard deviation (std = 0) is utilized to determine the dentists' decision on the image quality and detected abnormalities. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Stochastic Modelling Of Bioethanol Fermentation By Saccharomyces Cerevisiae Grown In Oil Palm Residues by Samsudin , Mohd Dinie Muhaimin

    Published 2015
    “…However, this result might differ if it is to be reduplicated due to heterogeneity of OPT sap and POME as well as variability in Baker’s yeast’s performance. Therefore, a predictability test was carried out using Monte Carlo algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm by Ahmadi, Seyedeh Parisa

    Published 2018
    “…This study evaluated the use of insitu and remote sensors to early detect the Ganoderma infected oil palms before the visual symptoms are manifested (mildly infected). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Comparative study of clustering-based outliers detection methods in circular-circular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Yong Zulina, Zubairi, Abdul Ghapor, Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Comparative study of clustering-based outliers detection methods in circular-circular regression model by Siti Zanariah Satari, Nur Faraidah Muhammad Di, Yong Zulina Zubairi, Abdul Ghapor Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Comparative study of clustering-based outliers detection methods in circularcircular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Yong Zulina, Zubairi, Abdul Ghapor, Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Experiment and analysis of computer vision-based wrist radial and ulnar deviation exercises by M. Zabri, Abu Bakar, Rosdiyana, Samad, Pebrianti, Dwi, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah

    Published 2017
    “…The researchers have kept on improving the existing methods by creating novel method or developing new algorithms in image processing and artificial intelligence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
    Get full text
    Get full text
    Article