Search Results - (( _ constructive method algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- parameter detection »
- method algorithm »
- constructive »
-
1
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Conventional methods of inspection of constructions are time-consuming, require much labor, and make people stand in hazardous conditions. …”
Get full text
Get full text
Student Project -
2
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…In this study, we propose an alternative method of constructing a confidence interval based from the distribution of the estimated value of error concentration parameter obtained from the Fisher information matrix. …”
Get full text
Get full text
Thesis -
3
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
Get full text
Get full text
Article -
4
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Object Localization In 3D Point Cloud
Published 2020“…In the descriptor construction step particularly, two methods, Point Feature Histogram (PFH) and Signature of Histograms of OrienTations (SHOT) were compared. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
7
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach
Published 2018“…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
Get full text
Get full text
Final Year Project -
9
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach
Published 2018“…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
Get full text
Get full text
Final Year Project -
11
Speed sensorless control for PMSM drives using Extended Kalman Filter
Published 2021“…Therefore, this project proposes sensorless control using an EKF. This method provides an optional estimation algorithm for the non-linear system that can produce a fast and accurate estimation of state variables. …”
Get full text
Get full text
Get full text
Article -
12
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
13
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
14
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…Unlike the conventional models of multi-cell channel parameters, the channel matrix of reduced rank multi-cell model has been estimated in parsimony to involve the detected users from the serving and neighboring cells.This proposed method can acquire and claim a remarkable improvement in the performance especially under the worst interference situations. …”
Get full text
Get full text
Thesis -
15
Analysing method for acoustic emission clustering system on reinforced concrete beam
Published 2018“…Acoustic Emission (AE) is a non-destructive testing (NDT) method used for damage detection in structural engineering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Machine condition monitoring and fault diagnosis using spectral analysis techniques
Published 2001“…Both normal and fault signals are analyzed using the singular value decomposition (SVD) algorithm so as to compute the parameters of the auto regressive moving average (ARMA) models. …”
Get full text
Get full text
Proceeding Paper -
17
Development of new code for optical code division multiple access systems
Published 2011“…Firstly, a comprehensive discussion takes place on all important aspects of existing codes from advantages and disadvantages point of view. Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
18
-
19
-
20
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis
