Search Results - (( normal extraction method algorithm ) OR ( variable detection method algorithm ))
Search alternatives:
- variable detection »
- normal extraction »
- method algorithm »
-
1
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…The results of three experiments demonstrate that our algorithm substantially outperforms all previous methods. …”
Get full text
Get full text
Article -
2
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Thus, IADS is a better solution for anomaly detection methods in detecting untrustworthy behaviour and to define attack and normal behaviours more accurately.…”
Get full text
Get full text
Thesis -
3
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
4
Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques
Published 2025“…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
Get full text
Get full text
Monograph -
5
Computer-aided diagnosis of diabetic subjects by heart rate variability signals using discrete wavelet transform method
Published 2015“…These features are ranked by using various ranking methods, namely, Bhattacharyya space algorithm, t-test, Wilcoxon test, Receiver Operating Curve (ROC) and entropy. …”
Get full text
Get full text
Get full text
Article -
6
Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm
Published 2015“…In this paper, we first review the advantages and limitations of different diagnostic methods which are currently available to detect FLD. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The results obtained from the simulation study and real data sets indicate that the proposed method possesses high detection power with minimal misclassification error compared to the MRCD and MDP methods. …”
Get full text
Get full text
Thesis -
9
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…Two types of experiments are conducted using the proposed feature extraction and classification algorithms. In the first experiment, classification of normal and pathological voice has been investigated. …”
Get full text
Thesis -
10
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…There are a lot of feature extraction methods and classification methods for iris classification. …”
Get full text
Get full text
Monograph -
11
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
12
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
13
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
14
A real time road marking detection system on large variability road images database
Published 2017“…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
Get full text
Get full text
Conference or Workshop Item -
15
Feature extraction from oil palm in vitro shoot images
Published 2010“…The algorithms and methods developed are robust and advanced enough to be used in combination with a machine vision algorithm and automation system. …”
Get full text
Get full text
Article -
16
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis -
17
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
Get full text
Get full text
Get full text
Thesis -
18
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
19
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Results showed that the developed FDD algorithm successfully detect and diagnosed the pre-designed faults. …”
Get full text
Get full text
Monograph -
20
Time normalization of LPC feature using warping method
Published 2005Get full text
Get full text
Get full text
Article
