Search Results - (( java implementation modified algorithm ) OR ( parameter deviation detection algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- parameter deviation »
- deviation detection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…This research focuses on the parameter estimation, outlier detection and imputation of missing values in a linear functional relationship model (LFRM). …”
Get full text
Get full text
Get full text
Thesis -
3
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…Meanwhile, SL-Satari/Di, CL-Satari/Di, and AL-Satari/Di algorithms are recommended to be used for large sample sizes since these algorithms perform very well in detecting the outliers and have low masking and swamping effect at any percentage of outliers and concentration parameter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
9
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process variables are defined as fault if they are deviated outside this region. Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
Get full text
Get full text
Article -
10
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
Get full text
Get full text
Thesis -
11
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…This study focuses on the parameter estimation and outlier detection for some types of the circular model. …”
Get full text
Get full text
Thesis -
12
Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach
Published 2018“…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
Get full text
Get full text
Final Year Project -
13
Fault diagnostic advisory system using moving-range chart and hazard operability study.
Published 2007“…The advisory system has successfully detected and diagnosed the deviations and displayed the causes and consequences of the faults. …”
Get full text
Get full text
Article -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
15
Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach
Published 2018“…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
Get full text
Get full text
Final Year Project -
16
Fault diagnostic advisory system using moving-range chart and hazard operability study
Published 2007“…The advisory system has successfully detected and diagnosed the deviations and displayed the causes and consequences of the faults. …”
Get full text
Get full text
Get full text
Article -
17
Add-on anomaly threshold technique for improving unsupervised intrusion detection on SCADA data
Published 2020“…The proposed technique can be used for any unsupervised anomaly detection approach to mitigate the sensitivity of such parameters and improve the performance of the SCADA unsupervised anomaly detection approaches. …”
Get full text
Get full text
Article -
18
Reactive approach for automating exploration and exploitation in ant colony optimization
Published 2016“…RACO can be used in providing a dynamic exploration and exploitation mechanism, setting a parameter value which allows an efficient search, describing the amount of exploration an ACO algorithm performs and detecting stagnation situations.…”
Get full text
Get full text
Get full text
Thesis -
19
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…The experiment on noisy data stream shows that BOCEDS algorithm can detect noise with an accuracy of approximately 100%. …”
Get full text
Get full text
Thesis -
20
GENETIC FUZZY FILTER BASED ON MAD AND ROAD TO REMOVE MIXED IMPULSE NOISE
Published 2010“…The GA training aims to find the best parameters for the fuzzy sets in the fuzzy noise detection. …”
Get full text
Get full text
Thesis
