Search Results - (( parameter detection method algorithm ) OR ( data distribution system algorithm ))

Refine Results
  1. 1

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  2. 2

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In the first step, all possible detection parameters/ signals which can be affected by islanding occurrence in the system are measured locally for islanding and non-islanding conditions. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering by Davari, Atefeh, Marhaban, Mohammad Hamiruce, Mohd Noor, Samsul Bahari, Karimadini, Mohammad, Karimoddini, Ali

    Published 2011
    “…The main contribution of the proposed method is the ability to estimate the parameters, given a small number of data which will usually be the case in practical applications. …”
    Get full text
    Get full text
    Article
  5. 5

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…The proposed solution introduces and integrates ordering constraints along with a submodular energy minimisation function to/with the GC algorithm to enhance performance. The authors measured sensitivity and recall for all parameters against ground truth data for differently cropped images of 16 power poles. …”
    Get full text
    Get full text
    Article
  8. 8

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…The outcomes of this study prove the ability of the proposed and applied methods to make valid detection and prediction for rockfall phenomena. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Image processing based foot plantar pressure distribution analysis and modeling by Sabry, Ali Hussein, Wan Hasan, Wan Zuha, Mohtar, Mohd Nazim, Raja Ahmad, Raja Mohd Kamil, Ramli, Hafiz Rashidi, Ang, S. P., Abdul Hamid, Zainidi

    Published 2020
    “…In order to derive formulas in this concern, this research proposes a measurement-based method which adopts the reference measured parameters such as; the weight of a subject, contact-area size, age, and the pressure level distribution over a plantar image captured by the EMED plantar pressure system. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…In this research, two test systems have been used which is IEEE 13 bus system and IEEE 30 bus system for data generations. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Computer aided diagnoses for detecting the severity of Keratoconus by Abdullah, Osamah Qays, Boughariou, Aicha, Al-Azawi, Fadia W., Al-Araji, Ahmed Mohammed Khadum Abdulamer, Mehdy, Mehdy Mwaffeq

    Published 2024
    “…Methods: Data were collected from February 2022 to March 2023, comprising 97 cases from private clinics in southern Iraq. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article