Search alternatives:
sampling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
Showing 1 - 20 results of 259 for search '(( elements method algorithm ) OR ((( data detection algorithm ) OR ( based sampling algorithm ))))', query time: 0.14s Refine Results
  1. 1

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy by Raad, M.W.

    Published 2006
    “…A fast waveform sampling facility has been recently developed and integrated into the VAX-based data acquisition system at the Center for Applied Physical Sciences (CAPS). …”
    Get full text
    Get full text
    article
  2. 2

    Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems by Majdi Mansouri (16869885)

    Published 2022
    “…The proposed improved ABO method consists in reducing the number of samples in the training data set using the Euclidean distance and extracting the most significant features from the reduced data using ABO algorithm. …”
  3. 3

    Sample intelligence-based progressive hedging algorithms for the stochastic capacitated reliable facility location problem by Nezir Aydin (8355378)

    Published 2024
    “…We present the effectiveness of the developed integrated approaches, Sampling Based Progressive Hedging Algorithm (SBPHA) and Discarding SBPHA (d-SBPHA), over the pure strategies (i.e. …”
  4. 4

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems by Khaled Dhibi (16891524)

    Published 2023
    “…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
  5. 5

    Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions by Liu, Wenpeng

    Published 2017
    “…This paper reviews testing procedures, data analysis, updated algorithms used for joint detection, and discusses the latest round of testing in samples with simulated joints at various angles along the borehole.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 6
  7. 7

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …”
  8. 8

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
  9. 9
  10. 10

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text
  11. 11
  12. 12

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 13
  14. 14

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
    Get full text
  15. 15

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
    Get full text
    Get full text
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …”