Search Results - (( interval detection method algorithm ) OR ( using optimization based algorithm ))
Search alternatives:
- method algorithm »
- interval »
-
1
Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi
Published 2016“…As a consequence, the computational performance of structural health monitoring strategies will be directly influenced by the higher computational competency and convergence rate of the proposed wavelet-based method for structural simulation. Accordingly, in the second part of this research, the procedure of structural identification and damage detection has been developed by employing the wavelet-based method through the modified genetic algorithms (GAs) to optimally solve inverse problems. …”
Get full text
Get full text
Thesis -
2
-
3
An intelligent optical fibre Al(lll) sensor based on advanced materials-sol-gel & polyaniline-porous nanocomposite / Faiz Bukhari Mohd Suah, Abdul Mutalib Md Jani and Mohd Nasir Ta...
Published 2006“…In contrast to traditional methods, the use of this methodology has advantages in terms of a reduction in analysis time and an improvement in the ability of optimization. …”
Get full text
Get full text
Research Reports -
4
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…This method uses an improved Pan-Tompkins algorithm from the previous work with independent of the isoelectric line approach for detecting the QRS onset and the T offset. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Automated fault detection and extraction under gas chimneys using hybrid discontinuity attributes
Published 2021“…Contrary to several available fault tracking techniques that use local seismic continuity like coherency attributes, our hybrid method is based on directed semblance, which incorporates aspects of Dave Haleâ��s superior fault-oriented semblance algorithm. …”
Get full text
Get full text
Article -
6
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
Get full text
Get full text
Thesis -
7
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
Get full text
Get full text
Get full text
Thesis -
8
On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection
Published 2022“…Compared with the original ResNet algorithm, the proposed method provides overlapped intervals of continuous attributes and fuzzy rules to ResNet, improving the fuzziness of ResNet. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Get full text
Article -
10
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
Published 2016“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Book Chapter -
12
Threshold value of DC array current and DC string voltage for fault detection in grid-connected photovoltaic system / Nurmalessa Muhammad … [et al.]
Published 2020“…One of the methods in detecting failure is by using the threshold-based method to compute the ratio of actual and predicted DC array current and DC string voltage value. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
14
Human presence detection system
Published 2024“…Rigorous testing and experimentation were conducted to establish the most effective delay interval, ensuring reliable detection while minimizing false alarms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
16
Numerical Analysis of structural batteries response with the presence of uncertainty
Published 2023“…In evaluating the influence of the uncertainty parameters, Interval Monte Carlo Simulation and the interval finite element method are used to compute the bounds of the structure behavior. …”
Get full text
Get full text
Get full text
Article -
17
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
18
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
19
Optimization of cost-based hybrid flowshop scheduling using teaching-learning-based optimization algorithm
Published 2024“…This paper investigates the optimization of a CHFS problem using the Teaching Learning-Based Optimization (TLBO) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
