Search Results - (( basic detection method algorithm ) OR ( loading identification using algorithm ))
Search alternatives:
- loading identification »
- identification using »
- method algorithm »
- basic detection »
- using algorithm »
-
1
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
2
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
3
-
4
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
Get full text
Get full text
Thesis -
5
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
6
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
8
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
9
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…Subsequently, an automatic HIF classification algorithm based on predefined indices is proposed to perform event identification and HIF detection. …”
Get full text
Get full text
Article -
10
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The correlation analysis is used for the identification and selection of the most influential input variable vector (IVV). …”
Get full text
Get full text
Thesis -
11
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
12
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
13
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
Get full text
Get full text
Book Section -
14
-
15
Web Camera Application For Motion Detection
Published 2003“…The new method to detect motion is "vision motion detection". …”
Get full text
Get full text
Thesis -
16
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
17
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Prior to localization of the base of young corn tree, skeletonizing operation is performed to get the basic shape of the object. Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
18
Retrieval based on skin color to detect the malicious images
Published 2009Get full text
Get full text
Get full text
Research Report -
19
-
20
Investigate And Analysis Of Deep Learning And Machine Learning Algorithm For Face Mask Detection System
Published 2022Get full text
Get full text
Undergraduates Project Papers
