Search Results - (( variable step detection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- step detection »
- variable »
-
1
Robust Estimation Methods And Outlier Detection In Mediation Models
Published 2010Get full text
Get full text
Thesis -
2
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
3
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…There are two strategies that have been implemented in the numerical solutions which are the variable step size and the variable step size and variable order. …”
Get full text
Get full text
Thesis -
4
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…This framework is implemented in three key steps. The first step is devoted to detecting invisible patches. …”
Get full text
Get full text
Thesis -
5
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. The performance of our system was measured in terms of detection rate, accuracy, and false alarm rate. …”
Get full text
Get full text
Thesis -
6
DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION
Published 2018“…Therefore, the main objective of the project is to develop an OE-based Brown-Forsythe test algorithm to effectively detect the presence of control valve stiction.In this study, the proposed OE model is developed using System Identification in MATLAB, where it is used to simulate the process output (PV). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…We propose an optimized crossover scheme that changes the crossover operation from being fixed-length to random-length, which has been designed to fit for the proposed variable length DE. We refer to the new DE algorithm as random variable length crossover DE (rvlx- DE) algorithm. …”
Get full text
Get full text
Thesis -
8
Improved robust estimator and clustering procedures for multivariate outliers detection
Published 2023“…TOC is developed by modified Concentration-Step (C-Step) in the Fast Minimum Covariance Determinant (FMCD) algorithm. …”
Get full text
Get full text
Thesis -
9
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
Get full text
Get full text
Article -
10
Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques
Published 2025“…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
Get full text
Get full text
Monograph -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
12
On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models
Published 2023“…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
Get full text
Get full text
Get full text
Article -
13
Detection and Classification of Moving Objects for an Automated Surveillance System
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis -
14
Detection and classification of moving objects for an automated surveillance system
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis -
15
Development Of Two New Auxiliary Information Control Charts, And Economic And Economic-Statistical Designs Of Several Auxiliary Information Control Charts
Published 2020“…Optimal parameters computed using the optimization algorithms developed and the step-by-step approach for constructing the optimal RS - AI chart are provided in this thesis. …”
Get full text
Get full text
Thesis -
16
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
17
Development of sorting system for oil palm in vitro shoots using machine vision approach
Published 2014“…A smart object tracking algorithm (SOTA) has been proposed for detecting and identifying the shoot on the conveyor belt. …”
Get full text
Get full text
Thesis -
18
Detection and classification of moving objects for an automated surveillance system
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis -
19
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…Human activity detection through fusion of multimodal sensors are vital steps to achieve automatic and comprehensive monitoring of human behaviours, build smart home systems and detect sports activities. …”
Get full text
Get full text
Get full text
Thesis -
20
Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid
Published 2012“…The motor features are extracted through the proposed Discrete Wavelet Transform (DWT) based analysis method, while the wavelet inlet acts as an expert tool to adapt the right controller in accordance with the fault type. The fault detection algorithm identifies the time and location of each fault. …”
Get full text
Get full text
Thesis
