Search Results - (( using estimation method algorithm ) OR ( points detection method algorithm ))

Refine Results
  1. 1
  2. 2

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets by A. Baba, Ishaq, Midi, Habshah, June, Leong W., Ibragimov, Gafurjan

    Published 2024
    “…The basic idea of our proposed method is to modify the Mahalanobis distance so that it uses only the diagonal elements of the scatter matrix in the computation of the RFCH algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Robust Estimation Methods And Outlier Detection In Mediation Models by Fitrianto, Anwar

    Published 2010
    “…The Ordinary Least Squares (OLS) method is often use to estimate the parameters of the mediation model. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Deep learning-based single-shot and real-time vehicle detection and ego-lane estimation by Abdul Matin, M. A. A., Ahmad Fakhri, A. S., Mohd Zaki, Hasan Firdaus, Zainal Abidin, Zulkifli, Mohd Mustafah, Y., Abd Rahman, H., Mahamud, N. H., Hanizam, S., Ahmad Rudin, N. S.

    Published 2020
    “…These involve an elaborated FCWS pipeline using classical computer vision methods which limits the robustness of the overall system and limits the scalability of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  15. 15

    Document image skew detection and correction method based on extreme points by Wagdy, M., Faye, I., Rohaya, D.

    Published 2014
    “…In this paper we present a method for estimating the document image skew angle. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Benthic habitat mapping and coral bleaching detection using quickbird imagery and Kd algorithm by Kabiri, Keivan

    Published 2013
    “…Half numbers of these points were selected to determine the mentioned parameters using minimizing the sum of the squared residuals, and the other points were used for accuracy assessment of the applied method. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Facial age range estimation using geometric ratios and hessian-based filter wrinkle analysis by Razalli, Husniza

    Published 2016
    “…Although the estimation result promising, the method still have limitation because it’s work with manual calibration to detect, to extract all the landmark point to estimate human facial age. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform by Ooi , Chong Wei

    Published 2015
    “…Experimental results shows that SURF and SIFT are robust algorithm performing stable key point detection. These techniques are invariant to scale and rotation. …”
    Get full text
    Get full text
    Thesis