Search Results - (( parameter detection method algorithm ) OR ( data distribution computer algorithm ))
Search alternatives:
- distribution computer »
- parameter detection »
- data distribution »
- method algorithm »
-
1
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
2
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
3
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
Get full text
Get full text
Thesis -
4
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model
Published 2000“…To detect irregularities and peculiarities in the data set, the residuals, Cook distance and the likelihood distance were computed. …”
Get full text
Get full text
Thesis -
6
Image processing based foot plantar pressure distribution analysis and modeling
Published 2020“…In order to derive formulas in this concern, this research proposes a measurement-based method which adopts the reference measured parameters such as; the weight of a subject, contact-area size, age, and the pressure level distribution over a plantar image captured by the EMED plantar pressure system. …”
Get full text
Get full text
Get full text
Article -
7
Implementation of YOLOv8-seg on store products to speed up the scanning process at point of sales
Published 2024“…The small number of data points and the small number of epochs have proven reliable algorithms to implement on store products instead of using QR codes in a digital manner. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Machine condition monitoring and fault diagnosis using spectral analysis techniques
Published 2001“…Both normal and fault signals are analyzed using the singular value decomposition (SVD) algorithm so as to compute the parameters of the auto regressive moving average (ARMA) models. …”
Get full text
Get full text
Proceeding Paper -
9
Computer aided diagnoses for detecting the severity of Keratoconus
Published 2024“…The study proposed an image analysis method for corneal topography images using MATLAB R2020a. …”
Get full text
Get full text
Get full text
Article -
10
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
11
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
12
Data discovery algorithm for scientific data grid environment
Published 2005“…Data grid mostly deals with large computational problems and provides geographically distributed resources for large-scale data-intensive applications that generate large data sets. …”
Get full text
Get full text
Get full text
Article -
13
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
14
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
15
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
16
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
17
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
19
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…This thesis proposes data-intensive workflow optimization algorithms. …”
Get full text
Get full text
Get full text
Thesis -
20
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article
