Search Results - (( using function a algorithm ) OR ( linear detection method algorithm ))
Search alternatives:
- linear detection »
- method algorithm »
- using function »
- a algorithm »
- function a »
-
1
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
2
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Therefore, a new reference-free damage detection algorithm is proposed. …”
Get full text
Get full text
Get full text
Thesis -
4
Identifying multiple outliers in linear functional relationship model using a robust clustering method
Published 2023“…In this study, we propose an efficient clustering procedure to identify multiple outliers in the linear functional relationship model using the single linkage algorithm with the Euclidean distance as the similarity measure. …”
Get full text
Get full text
Get full text
Article -
5
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…We then develop a new algorithm to address the summarizing strategies identification problem. …”
Get full text
Get full text
Thesis -
6
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
Get full text
Get full text
Get full text
Article -
7
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
8
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The HHT is a way to decompose a signal into intrinsic mode functions (IMF). …”
Get full text
Get full text
Thesis -
9
Novel hybrid maximum power point tracking algorithm for PV systems under partially shaded conditions
Published 2015Get full text
Get full text
Conference or Workshop Item -
10
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…The first objective of this study is to improve a new algorithm technique for classification. The new algorithm come from a combination of an ideas of k-NN algorithm and ensemble concept. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Human odour detection approach using machine learning
Published 2019“…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
On some methods of feature engineering useful for craniodental morphometrics of rats, shrews and kangaroos / Aneesha Pillay Balachandran Pillay
Published 2024“…The results showed that the RFE-selected features were able to improve the classification accuracy of the machine learning algorithms. However, the linear measurements used in TM can only detect changes in size and can be insensitive to geometrical transformations. …”
Get full text
Get full text
Get full text
Thesis -
13
Particle Swarm Optimization Algorithm Based Fuzzy Controller for Solid-State Transfer Switch Toward Fast Power Transfer and Power Quality Mitigation
Published 2024“…A harmonic filter is employed to remove unwanted harmonic components generated by both linear and non-linear loads. …”
Article -
14
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
Get full text
Get full text
Thesis -
15
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. …”
Get full text
Get full text
Thesis -
16
On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models
Published 2023“…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
Get full text
Get full text
Get full text
Article -
17
Implementing a novel hybrid maximum power point tracking technique in DSP via Simulink/MATLAB under partially shaded conditions
Published 2016“…Thus, after recognizing the possible location of the GMPP, the modified P&O can be used to obtain the GMPP. The simulation and experimental implementations for the proposed algorithm are performed with different scenarios of shadowing under different irradiations, which clearly indicate that the proposed method is robust and has a fast tracking speed. …”
Get full text
Get full text
Get full text
Article -
18
Particle Swarm Optimised Controller for Solid-State Transfer Switch Towards Fast Power Transfer and PQ Mitigation
Published 2023Conference Paper -
19
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…There have been considerable interest in recent years in the detection and accommodation of multiple outliers in linear regression. …”
Get full text
Get full text
Monograph -
20
Detection of a maximum blood flow velocity variation in the carotid artery during physical exercise using BPNN
Published 2007“…In this paper, we have developed a noninvasive device to be able to measure blood flow velocity in the carotid during physical exercise by using a Doppler ultrasound method. …”
Get full text
Get full text
Get full text
Proceeding Paper
