Search Results - (( using function method algorithm ) OR ( linear detection method algorithm ))
Search alternatives:
- method algorithm »
- linear detection »
- function method »
- using function »
-
1
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
2
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
3
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Identifying multiple outliers in linear functional relationship model using a robust clustering method
Published 2023“…Application in real data also shows that the proposed clustering method for this linear functional relationship model successfully detects the outliers, thus suggesting the method’s practicality in real-world problems.…”
Get full text
Get full text
Get full text
Article -
5
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
Get full text
Get full text
Thesis -
6
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
Get full text
Get full text
Get full text
Article -
7
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
8
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…In a recent study, the analysis of pressure transient signals could be seen as an accurate and low-cost method for leak and feature detection in water distribution systems. …”
Get full text
Get full text
Thesis -
9
Novel hybrid maximum power point tracking algorithm for PV systems under partially shaded conditions
Published 2015Get full text
Get full text
Conference or Workshop Item -
10
On some methods of feature engineering useful for craniodental morphometrics of rats, shrews and kangaroos / Aneesha Pillay Balachandran Pillay
Published 2024“…The results showed that the RFE-selected features were able to improve the classification accuracy of the machine learning algorithms. However, the linear measurements used in TM can only detect changes in size and can be insensitive to geometrical transformations. …”
Get full text
Get full text
Get full text
Thesis -
11
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…This study focuses on supervised learning that seek to classify all the Iris dataset respect to three species (setosa, versicolor and virginica) in order them to mimic the actual dataset by using Support Vector Machine with four different kernel function (Linear, Radial Basis, Sigmoid and Polynomial), Random Forest (RF), k-Nearest Neighbors(k-NN) and Random Nearest Neighbors (RNN) as a method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Human odour detection approach using machine learning
Published 2019“…There is a total of 198 voes detected and methods for selecting features are used to determine which VOCs are suitable for classifying human odour. …”
Get full text
Get full text
Get full text
Thesis -
13
Particle Swarm Optimization Algorithm Based Fuzzy Controller for Solid-State Transfer Switch Toward Fast Power Transfer and Power Quality Mitigation
Published 2024“…The objective of this research is to propose an innovative method for improving the efficiency and productivity of fuzzy logic controllers (FLCs) under the influence of harmonics in non-linear loads, by using particle swarm optimization (PSO) for solid-state transfer switch (SSTS). …”
Article -
14
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. We propose a diverse fusion-selection approach that stands on Oracle to be applied to the classifier ensemble design, where the Oracle is a random linear function. …”
Get full text
Get full text
Thesis -
15
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
Get full text
Get full text
Thesis -
16
Implementing a novel hybrid maximum power point tracking technique in DSP via Simulink/MATLAB under partially shaded conditions
Published 2016“…Moreover, this work presents the load sizing method for PSCs to avoid controller failure when detecting the GMPP. …”
Get full text
Get full text
Get full text
Article -
17
On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models
Published 2023“…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
Get full text
Get full text
Get full text
Article -
18
Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model
Published 2004“…A typical or fixed sigmoid function method is used in learning phase. In the recognition phase, an adaptive sigmoid function is employed. …”
Get full text
Get full text
Thesis -
19
Particle Swarm Optimised Controller for Solid-State Transfer Switch Towards Fast Power Transfer and PQ Mitigation
Published 2023Conference Paper -
20
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…There have been considerable interest in recent years in the detection and accommodation of multiple outliers in linear regression. …”
Get full text
Get full text
Monograph
