Search Results - (( data detection method algorithm ) OR ( simulation optimization method algorithm ))*
Search alternatives:
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. …”
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
3
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…In addition, a simple procedure is proposed to determine the optimal solution and predict the correlation factor and the frequency of the damaged communication tower by using the particle swarm optimization (PSO) method. …”
Get full text
Get full text
Thesis -
4
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm
Published 2025“…Consequently, this paper proposes a method to improve the detection accuracy of You Only Look Once version 8 (YOLOv8) using Salp Swarm Algorithm (SSA) for hyperparameter optimization, focusing on eight key parameters. …”
Get full text
Get full text
Get full text
Article -
6
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…In order to generate optimal data to satisfy whole constraints in the feasible path, new method with SBTs is necessary to satisfy the whole constraints at the same time of the whole path executing. …”
Get full text
Get full text
Get full text
Thesis -
7
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
8
Reduced complexity optimum detector for block data transmission systems
Published 2010Get full text
Article -
9
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Article -
10
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection
Published 2024“…The proposed model leverages machine learning algorithms for autonomous detection of insulators. To determine the optimal stopping point and safety distance between the UAV and the insulator, a mathematical model is presented that utilises the captured images and the machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Novel algorithm for mobile robot path planning in constrained environment
Published 2021“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
Get full text
Get full text
Thesis -
14
Novel algorithm for mobile robot path planning in constrained environment
Published 2022“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Article -
15
Novel algorithm for mobile robot path planning in constrained environment
Published 2022“…Moreover, the performance of the proposed method was compared with the A-star and laser simulator (LS) algorithms in terms of path length, computational time and path smoothness. …”
Get full text
Get full text
Get full text
Article -
16
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
17
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…In future work, the algorithm can still be optimized to offer better performance. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
19
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…Some computer simulation results are presented to justify the need for this modified method of analysis. …”
Get full text
Get full text
Get full text
Article -
20
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…Not much research has been done on method of detecting HLPs for panel data. Hence, we have proposed Robust Diagnostic-F (RDF) to remedy the problem of masking and swamping in detecting HLPs. …”
Get full text
Get full text
Thesis
