Search Results - (( data detection using algorithm ) OR ( simulation optimization based algorithm ))
Search alternatives:
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
2
A noble approach of ACO algorithm for WSN
Published 2018“…The proposed algorithm has been simulated and verified utilizing MATLAB and the simulation results demonstrate that new ant colony optimization based algorithm can achieve better performance and faster convergence to determine the best cost route.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm
Published 2025“…The model is trained using the Czech data in Road Damage Dataset RDD2022 from the Crowdsensing-based Road Damage Detection Challenge (CRDDC’2022), with 80% of the data used for training and 20% for validation. …”
Get full text
Get full text
Get full text
Article -
4
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
5
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
6
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…A new GASOS-based MUD hardware design for SDMA-OFDM systems is proposed using FPGA architecture. …”
Get full text
Get full text
Article -
7
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
8
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The second contribution of this thesis is developing an accurate search-based test data generator for generating automatically optimal test data to satisfy the whole constraints in the path. …”
Get full text
Get full text
Get full text
Thesis -
9
Reduced complexity optimum detector for block data transmission systems
Published 2010Get full text
Article -
10
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…Simulation results demonstrate that the proposed CoFA and SdMP algorithms for CE have around 11.1%, 18.3%, 28.9% and 42.8% and around 5.6%, 13.9%, 22.8% and 33.3% performance improvement at MSE value of 2 × 10−3 when compared to FACS, gOMP, OMP and ROMP algorithms, respectively. …”
Get full text
Get full text
Thesis -
11
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
12
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Article -
13
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…Interaction, or t-way, testing, where t indicates the interaction strength, is an approach to generate test suite for detecting fault due to interaction. In line with the emerging field called Search based Software Engineering, many recently developed t-way strategies have adopted meta-heuristic algorithms as the basis of their implementations such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization Algorithm, Particle Swarm Optimization, Harmony Search and Cuckoo Search, owing their superior performance in term of test size reduction as compared to general computational based strategies, such as General t-way, Test Vector Generator, In Parameter Order General, Jenny, and Automatic Efficient Test Generator. …”
Get full text
Get full text
Thesis -
15
-
16
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…First is the Versatile Shuffle Recomputation Resource Units (VSR-RUs), which use the Fisher-Yates shuffling algorithm to optimize RU utilization and reduce collisions. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
Get full text
Get full text
Thesis -
18
Improving EEG Signal Peak Detection Using Feature Weight Learning of a Neural Network with Random Weights for Eye Event-Related Applications
Published 2017“…The optimization of peak detection algorithms for electroencephalogram (EEG) signal analysis is an ongoing project; previously existing algorithms have been used with different models to detect EEG peaks in various applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Design optimization and navigation for autonomous guided vehicle (AGV) in agriculture plantation
Published 2024“…For obstacle avoidance, the same LIDAR is applied with the obstacle detection algorithm to detect the human or object around the AGV to prevent any collision. …”
Get full text
Get full text
Get full text
Article
