Search Results - (( control optimization method algorithm ) OR ( data detection method algorithm ))

Refine Results
  1. 1

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Zakaria, Mohd Sharif, Abas, Mohammad Fadhil, Dg Jamil, Fatimah, Mohd Saad, Norhafidzah, Hashim, Addie Irawan, Pebrianti, Dwi

    Published 2024
    “…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…In these experiments, it was demonstrated that the FLN optimization method achieved 0.9964 which is a higher accuracy than most of the existing paradigms for classifying network intrusion detection data.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…Finally, the third challenge is how to find the optimal evolutionary method for railway network planning to increase the RFID system performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…These techniques have been used to optimize control points and weights in the description of spline functions used. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection by Sze Sin, Voon, Kho, Lee Chin, Ngu, Sze Song, Annie, Joseph, Kuryati, Kipli

    Published 2024
    “…The proposed model leverages machine learning algorithms for autonomous detection of insulators. To determine the optimal stopping point and safety distance between the UAV and the insulator, a mathematical model is presented that utilises the captured images and the machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Prostate cancer prediction using feedforward neural network trained with particle swarm optimizer by Jui, Julakha Jahan, Molla, M. M.Imran, Alam, Mohammad Khurshed, Ferdowsi, Asma

    Published 2022
    “…Many prostate cancer detection methods have been established in the recent past, but they have not effectively diagnosed cancer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    2D Forward Modeling of Marine Controlled Source Electromagnetic (CSEM) Data for Salt-Dome and Stratigraphy Trap Reservoir by Hussain, Nazabat, Karsiti , Mohd Noh, Yahya, Noorhana, Yahya, Norashikin

    Published 2012
    “…In this paper, we employs 2D forward modeling algorithm using finite difference (FD) method and finite element (FE) method to solve EM-field governing equations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The goal is to identify changes in a method's body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism, select the test cases based on affected statements and ordered them based on their fitness by using GA. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches by Ahmad Khan, Muzammil, Mahmood Khan, Shariq, Subramaniam, Siva Kumar

    Published 2023
    “…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Regression test case selection & prioritization using dependence graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The goal is to identify changes in a method's body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism, select the test cases based on affected statements and ordered them based on their fitness by using GA.The number of affected statements determined how fit a test case is good for regression testing. …”
    Get full text
    Get full text
    Article
  17. 17

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…Basics and ensures that the software is more secure than the previous traditional attendance method using roll-less slides. For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Detection of Workers’ Behaviour in the Manufacturing Plant using Deep Learning by Goh, Ching Pang

    Published 2023
    “…Utilizing machine learning algorithms, our system learns and detects intricate activities from worker behavior sequences, offering a sophisticated analysis of worker efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…To deal with these issues, adaptive sampling algorithm is applied to the data points to adhere to the manipulators speed constraints. …”
    Get full text
    Get full text
    Thesis