Search Results - (( using function method algorithm ) OR ( linear detection method algorithm ))

Refine Results
  1. 1

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Identifying multiple outliers in linear functional relationship model using a robust clustering method by Adilah Abdul Ghapor, Yong Zulina Zubairi, Al Mamun, Sayed Md., Siti Fatimah Hassan, Elayaraja Aruchunan, Nurkhairany Amyra Mokhtar

    Published 2023
    “…Application in real data also shows that the proposed clustering method for this linear functional relationship model successfully detects the outliers, thus suggesting the method’s practicality in real-world problems.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…In a recent study, the analysis of pressure transient signals could be seen as an accurate and low-cost method for leak and feature detection in water distribution systems. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    On some methods of feature engineering useful for craniodental morphometrics of rats, shrews and kangaroos / Aneesha Pillay Balachandran Pillay by Aneesha Pillay , Balachandran Pillay

    Published 2024
    “…The results showed that the RFE-selected features were able to improve the classification accuracy of the machine learning algorithms. However, the linear measurements used in TM can only detect changes in size and can be insensitive to geometrical transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An improved algorithm for iris classification by using support vector machine and binary random machine learning by Kamarulzalis, Ahmad Haadzal

    Published 2018
    “…This study focuses on supervised learning that seek to classify all the Iris dataset respect to three species (setosa, versicolor and virginica) in order them to mimic the actual dataset by using Support Vector Machine with four different kernel function (Linear, Radial Basis, Sigmoid and Polynomial), Random Forest (RF), k-Nearest Neighbors(k-NN) and Random Nearest Neighbors (RNN) as a method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…There is a total of 198 voes detected and methods for selecting features are used to determine which VOCs are suitable for classifying human odour. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Particle Swarm Optimization Algorithm Based Fuzzy Controller for Solid-State Transfer Switch Toward Fast Power Transfer and Power Quality Mitigation by Hannan M.A., Sebastian G., Al-Shetwi A.Q., Ker P.J., Rahman S.A., Mansor M., Muttaqi K.M., Uddin M.

    Published 2024
    “…The objective of this research is to propose an innovative method for improving the efficiency and productivity of fuzzy logic controllers (FLCs) under the influence of harmonics in non-linear loads, by using particle swarm optimization (PSO) for solid-state transfer switch (SSTS). …”
    Article
  14. 14

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. We propose a diverse fusion-selection approach that stands on Oracle to be applied to the classifier ensemble design, where the Oracle is a random linear function. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved static and dynamic FBG sensor system for real-time monitoring of composite structures by Vorathin, Epin

    Published 2017
    “…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models by Susanto, Tabita Yuni, Choiruddin, Achmad, Purnomo, Jerry Dwi Trijoyo

    Published 2023
    “…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model by Mohamad Hussin, Ummu Salmah

    Published 2004
    “…A typical or fixed sigmoid function method is used in learning phase. In the recognition phase, an adaptive sigmoid function is employed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…There have been considerable interest in recent years in the detection and accommodation of multiple outliers in linear regression. …”
    Get full text
    Get full text
    Monograph