Search Results - (( control optimization based algorithm ) OR ( data detection method algorithm ))

Refine Results
  1. 1

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Zakaria, Mohd Sharif, Abas, Mohammad Fadhil, Dg Jamil, Fatimah, Mohd Saad, Norhafidzah, Hashim, Addie Irawan, Pebrianti, Dwi

    Published 2024
    “…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…In conclusion, this study presented a novel hybrid evolutionary algorithm based on the combination of AHP with GBCS to specify optimal RFID reader positions and amount based on the working train station domain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…In these experiments, it was demonstrated that the FLN optimization method achieved 0.9964 which is a higher accuracy than most of the existing paradigms for classifying network intrusion detection data.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The goal is to identify changes in a method's body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism, select the test cases based on affected statements and ordered them based on their fitness by using GA. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches by Ahmad Khan, Muzammil, Mahmood Khan, Shariq, Subramaniam, Siva Kumar

    Published 2023
    “…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Regression test case selection & prioritization using dependence graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The goal is to identify changes in a method's body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism, select the test cases based on affected statements and ordered them based on their fitness by using GA.The number of affected statements determined how fit a test case is good for regression testing. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…To deal with these issues, adaptive sampling algorithm is applied to the data points to adhere to the manipulators speed constraints. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Detection of Workers’ Behaviour in the Manufacturing Plant using Deep Learning by Goh, Ching Pang

    Published 2023
    “…Utilizing machine learning algorithms, our system learns and detects intricate activities from worker behavior sequences, offering a sophisticated analysis of worker efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The fault detection algorithm identifies the time and location of each fault. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…The Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for role-based access control and judge contracts. To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
    Article
  16. 16

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis by Adnani, Seyedeh Atena

    Published 2011
    “…In addition comparison of statistical measures and performances between Taguchi method and ANN shows that ANN was slightly better than Taguchi for data fitting and estimation capabilities. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
    Get full text
    Get full text
    Undergraduates Project Papers