Search Results - (( _ constructive method algorithm ) OR ( parameter detection method algorithm ))

Refine Results
  1. 1

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…Conventional methods of inspection of constructions are time-consuming, require much labor, and make people stand in hazardous conditions. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…In this study, we propose an alternative method of constructing a confidence interval based from the distribution of the estimated value of error concentration parameter obtained from the Fisher information matrix. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
    Get full text
    Get full text
    Article
  4. 4

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…In the descriptor construction step particularly, two methods, Point Feature Histogram (PFH) and Signature of Histograms of OrienTations (SHOT) were compared. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach by Omar, Noraimi

    Published 2018
    “…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach by Omar, Noraimi

    Published 2018
    “…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Speed sensorless control for PMSM drives using Extended Kalman Filter by Mat Lazi, Jurifa, Nordin, Mohamad Ikhwan, Talib, Md Hairul Nizam, Ibrahim, Zulkifilie

    Published 2021
    “…Therefore, this project proposes sensorless control using an EKF. This method provides an optional estimation algorithm for the non-linear system that can produce a fast and accurate estimation of state variables. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
    Get full text
    Get full text
    Article
  13. 13

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil

    Published 2013
    “…Unlike the conventional models of multi-cell channel parameters, the channel matrix of reduced rank multi-cell model has been estimated in parsimony to involve the detected users from the serving and neighboring cells.This proposed method can acquire and claim a remarkable improvement in the performance especially under the worst interference situations. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Analysing method for acoustic emission clustering system on reinforced concrete beam by Saiful Bahari, Nur Amira Afiza

    Published 2018
    “…Acoustic Emission (AE) is a non-destructive testing (NDT) method used for damage detection in structural engineering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Machine condition monitoring and fault diagnosis using spectral analysis techniques by Salami, Momoh Jimoh Eyiomika, Abdul Muthalif, Asan Gani, Pervez, T.

    Published 2001
    “…Both normal and fault signals are analyzed using the singular value decomposition (SVD) algorithm so as to compute the parameters of the auto regressive moving average (ARMA) models. …”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Firstly, a comprehensive discussion takes place on all important aspects of existing codes from advantages and disadvantages point of view. Splitting algorithm is proposed to construct the new code families namely RD code. …”
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis