Search Results - (( deviation detection method algorithm ) OR ( variable estimation method algorithm ))
Search alternatives:
- deviation detection »
- variable estimation »
- estimation method »
- method algorithm »
-
1
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…The results of three experiments demonstrate that our algorithm substantially outperforms all previous methods. …”
Get full text
Get full text
Article -
2
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
3
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
Get full text
Get full text
Get full text
Article -
4
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The proposed method inherits the robustness properties of the original RFCH estimators. …”
Get full text
Get full text
Thesis -
5
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
6
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…There are many types of motion estimation method but the most used method is the block matching method which is the fixed block matching and the variable block matching. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
9
Railway wheelset parameter estimation using signals from lateral velocity sensor
Published 2008“…The algorithm includes an instrumental variable (IV) element to reduce estimation bias and a variable forgetting factor for good parameter tracking and smooth steady state. …”
Get full text
Get full text
Get full text
Article -
10
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
11
Parameter estimation of a continuous-time plant – the least-absolute error with variable forgetting factor method
Published 2005“…The algorithm includes an instrumental variable (IV) element to reduce estimation bias and a variable forgetting factor for good parameter tracking and smooth steady state.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The advisory system algorithm used process history based method and presented by rule-based approach. …”
Get full text
Get full text
Thesis -
13
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
14
Robust Estimation Methods And Outlier Detection In Mediation Models
Published 2010“…The Ordinary Least Squares (OLS) method is often use to estimate the parameters of the mediation model. …”
Get full text
Get full text
Thesis -
15
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
17
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Experiment and analysis of computer vision-based wrist radial and ulnar deviation exercises
Published 2017“…The researchers have kept on improving the existing methods by creating novel method or developing new algorithms in image processing and artificial intelligence. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
20
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article
