Search Results - (( dynamic deviation detection algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    A self-contained real-time angle deviation detection and measurement technique for straight line quadrocopter navigation using accelerometer / Nor Hashim Mohd Arshad … [et al.] by Mohd Arshad, Nor Hashim, Abdul Razak, Noorfadzli, Adnan, Ramli, Misnan, Mohamad Farid, M. Thamrin, Norashikin

    Published 2014
    “…This project proposes a new real-time adaptive trajectory correction algorithm for quadrocopter, which could specifically detect angle deviation through the use of accelerometer to allow for corrective action.…”
    Get full text
    Get full text
    Get full text
    Book Section
  2. 2

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment by Jianhong, Mei

    Published 2019
    “…To evaluate the performance of the proposed method, the average and variance error deviation are calculated. The Euclidean distances of detected lines from ground truth are used to compare the accuracy of the proposed method. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Reactive approach for automating exploration and exploitation in ant colony optimization by Allwawi, Rafid Sagban Abbood

    Published 2016
    “…RACO can be used in providing a dynamic exploration and exploitation mechanism, setting a parameter value which allows an efficient search, describing the amount of exploration an ACO algorithm performs and detecting stagnation situations.…”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Detection And Identification Of Stiction In Control Valves Based On Fuzzy Clustering Method by Daneshwar, Muhammad Amin

    Published 2016
    “…This modification prevents the fuzzy clustering algorithm from turning into numerical problem. A method, which gain benefits from the idea that in the presence of stiction, the cluster centers of main regions of flow control loops are deviated from their origin, is proposed to detect the deviation (detection). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A smart spectrum access technique for dynamic multi-hop routing in cognitive radio-based disaster response networks by Khaled F. I, Alaqad

    Published 2022
    “…Further, the deployment of Mobile Cognitive Base Stations (McBS) using the Dynamic Rule-Based Movement (DRUM) algorithm facilitates the effective transmission of data with low latency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Extending the range of an Optical Vanadium (V) Sensor Based on Immobilized Fatty Hydroxamic Acid in Poly (methyl Methacrylate) using Artifical Neural Network by Isha, Azizul, Yusof, Nor Azah, Ahmad, Musa, Suhendra, Dedy, Wan Yunus, Wan Md Zin, Zainal, Zulkarnain

    Published 2007
    “…The V(V)-FHA complex shows a limited linear dynamic range was extended with low calibration error.A three layer feed forward neural network using backpropagation (BP) algorithm was employed in this study. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Furthermore, the proposed method outperforms MVO-ANN, FC-ANN, DN, CSO-ANFIS, single ANFIS, and single ResNet in terms of detection rate, F1-score, and recall rate. Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item