Search Results - (( based constructive method algorithm ) OR ( using detection method algorithm ))
Search alternatives:
- based constructive »
- method algorithm »
- using detection »
-
1
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
2
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…This work demonstrated artificial sine signal constructed using Matlab software in order to identify the effectiveness and accuracy of this method. …”
Get full text
Get full text
Get full text
Article -
3
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…This work demonstrated artificial sine signal constructed using Matlab software in order to identify the effectiveness and accuracy of this method. …”
Get full text
Get full text
Article -
4
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
Get full text
Get full text
Get full text
Thesis -
5
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
Get full text
Get full text
Student Project -
7
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
8
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
Get full text
Get full text
Article -
9
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
10
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
Get full text
Get full text
Get full text
Thesis -
11
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
12
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
13
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Article -
14
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Fault Detection and Isolation for Complex System
Published 2017“…A two wheel robot is used as a complex system in this study. The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
IMAGE STITCHING USING HARRIS CORNER & SIFT FEATURES
Published 2016“…In this project work, the objective is to implement and design an algorithm of image stitching construction with approaches of two types of feature based, which are Harris corner and Scale-Invariant Feature Transform (SIFT) features method. …”
Get full text
Get full text
Final Year Project -
17
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
19
Automatic Road Network Recognition and Extraction for Urban Planning
Published 2009“…The extracted road regions are validated by using a segmentation method. These results are valuable for building road map and detecting the changes of the existing road database. …”
Get full text
Get full text
Get full text
Article -
20
