Search Results - (( pattern detection method algorithm ) OR ( data estimation methods algorithm ))
Search alternatives:
- estimation methods »
- pattern detection »
- methods algorithm »
- method algorithm »
- data estimation »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
2
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…The proposed estimation approach simplifies the typical trial-and-error method. …”
Get full text
Get full text
Article -
3
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…The proposed estimation approach simplifies the typical trial-and-error method. …”
Get full text
Get full text
Get full text
Article -
4
An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction
Published 2023“…In the third method, a hybrid algorithm called LSTM-C-EST, which is a combination of Fuzzy-MDL and LSTM-C is proposed. …”
Get full text
Get full text
Get full text
Thesis -
5
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
6
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article -
7
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
8
Effective source number enumeration approach under small snapshot numbers
Published 2024“…Experimental results show that the SEMD-based method performs significantly better than the traditional signal source number estimation algorithm in these complex environments, especially under a small number of snapshots, the SEMD method can still maintain a high estimation accuracy. …”
Get full text
Get full text
Get full text
Thesis -
9
Robust techniques for linear regression with multicollinearity and outliers
Published 2016“…The proposed method is formulated by incorporating robust MM-estimator and the modified generalized M-estimator (MGM) in the LRR algorithm. …”
Get full text
Get full text
Thesis -
10
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…For volume estimation purpose, a Digital Elevation Models (DEM) were generated from photogrammetric method with flight parameters of three (3) different camera focal length and ten (10) UAV altitude. …”
Get full text
Get full text
Thesis -
11
Image Stitching Of Aerial Footage
Published 2021“…The images are warped to the key frame of the footage to generate a stitched image by using the computed homography. The algorithm performance is evaluated using the Orchard datasets, consisting of L-shape flight pattern and lawnmower flight pattern. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…For instances, combination of inertial sensors provide mechanism to differentiate activity of similar patterns and accurate posture identification while other multimodal sensor data are used for energy expenditure estimations, object localizations in smart homes and health status monitoring. …”
Get full text
Get full text
Article -
13
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
Get full text
Get full text
Thesis -
14
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…The undetected group of missing oil palms trees are estimated based on the planting pattern design. Over-counting error can be eliminated by merging the detected trees which depart from each other within a threshold value. …”
Get full text
Get full text
Thesis -
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
17
-
18
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
19
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
Get full text
Get full text
Get full text
Thesis -
20
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis
