Search Results - (( (evolution OR solution) location detection algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1

    Collaborative Location-Based Mobile Game with Error Detection Algorithm by Adrus, Mohamad Tazuddin, Wong, Ming Ming, Abang Mohamad Aizuddin, Abang Mohd Mohtar

    Published 2018
    “…The game takes advantage of the weakness of Wi-Fi localization where environmental influence is significant and makes it part of the gameplay. A simple error detection algorithm is also introduced to maximize the game playability value by balancing game responsiveness and accuracy level.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In order to train Ridgelet probabilistic neural network, a modified differential evolution algorithm with new mutation phase, crossover process, and selection mechanism is introduced. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  4. 4

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…It becomes a vital problem to achieve CB as the distributed sensor nodes are unaware of their phase relationship. An iterative algorithm using evolution strategy (ES) is proposed to achieve phase alignment at the intended location in static channels, which require one-bit feedback from the receiver destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method by Zalili, Musa, Mohd Hafiz, Mohd Hassin, Nurul Izzatie Husna, Fauzi, Rohani, Abu Bakar, Watada, Junzo

    Published 2018
    “…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…In a source searching task, two possible scenarios can occur: source detected and source not detected. In this study, a complete solution to the two scenarios through an adaptive algorithm switching strategy is explored. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Therefore, a new reference-free damage detection algorithm is proposed. The RWPE measurements of different sensor-to-sensor pairs are applied for defining the reference-free damage index (RDI) of each sensor location. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…Surface defect segmentation algorithms in Automatic Optical Inspection (AOI) system for modern manufacturing industries provide solutions to quality control with speed, volume and traceability. …”
    Get full text
    Get full text
    Thesis
  9. 9

    From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks by Anabi, Hilary K., Nordin, Rosdiadee, Abdulghafoor, Omar B., Sali, Aduwati, Mohamedou, Ahmed, Almqdshi, Abdulmajid, Abdullah, Nor Fadzillah

    Published 2017
    “…Strategies to acquire white space information is the single most significant functionality in cognitive radio networks (CRNs) and as such, it has gone some evolution to enhance information accuracy. The evolution trends are spectrum sensing, prediction algorithm and recently, geo-location database technique. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…Several studies have provided solutions for detecting vegetation encroachment based on satellite images. …”
    text::Thesis
  11. 11

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…However, the challenge in data-driven detection is its effectiveness is often detection accuracy and the speed of detection. …”
    text::Thesis
  12. 12

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…The recent evolutions in embedded systems have now made the video sensor networks a reality. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…To solve this problem, an optimal load shedding approach, integrated with optimal DG sizing is proposed using the ABC-HC algorithm. This technique can find the load location to be shed, as well as the size of DG. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…It becomes a vital problem to achieve CB as the distributed sensor nodes are unaware of their phase relationship. An iterative algorithm using evolution strategy (ES) is proposed to achieve phase alignment at the intended location in static channels, which require one-bit feedback from the receiver destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Using electromechanical impedance and extreme learning machine to detect and locate damage in structures by Djemana, Mohamed, Hrairi, Meftah, Al Jeroudi, Yazan

    Published 2017
    “…In particular, electromechanical impedance (EMI) techniques give simple and low cost solutions for detecting damage in different structures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An improved bat algorithm with artificial neural networks for classification problems by Rehman Gillani, Syed Muhammad Zubair

    Published 2016
    “…Then, the proposed BAGD algorithm is frnther hybridized with Simulated Annealing (SA) and Genetic Algorithm (GA) to perform two stage optimization in which the former algorithm finds the optimal solution and the latter algorithm starts from where the first one is converged. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Passive client-centric rogue access point detection framework for WiFi hotspots by Ahmad, Nazrul Muhaimin

    Published 2018
    “…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…The FBTS integrated with automated edge-preserving regularization technique is first assessed with object detection application. The reconstructed images show that the algorithm was able to determine the dielectric properties within the region of interest (ROI) and estimate the shape, location of the embedded object. …”
    Get full text
    Get full text
    Thesis