Search Results - (( parameter detection method algorithm ) OR ( parameter detection based algorithm ))
Search alternatives:
- parameter detection »
- method algorithm »
- detection based »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…Proposed method returns one value of stiffness deterioration based on the considered set of modes, without affecting the sensitivity of damage detection algorithms. …”
Get full text
Get full text
Get full text
Article -
3
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
4
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
6
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
7
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
8
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
9
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Moreover, the study also pointed out the limitations of the manual and automatic crack detection system and underlined the fact that flight planning is one of the most critical parameters in the context of UAV-based inspections. …”
Get full text
Get full text
Student Project -
10
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…In accordance with the result, this article proposes a novel chew count estimation based on particle swarm optimization (PSO). First, the base of the algorithm is developed based on counting the peak of the chewing signal. …”
Get full text
Get full text
Article -
11
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…In univariate circular data, the presence of outliers is acclaimed will affect the parameter estimates and inferences. This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…In accordance with the result, this article proposes a novel chew count estimation based on particle swarm optimization (PSO). First, the base of the algorithm is developed based on counting the peak of the chewing signal. …”
Get full text
Get full text
Get full text
Article -
13
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
Get full text
Get full text
Article -
15
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
Get full text
Get full text
Get full text
Article -
16
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
Get full text
Get full text
Article -
17
-
18
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
19
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. …”
Get full text
Get full text
Get full text
Article -
20
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…Results show that the defect detection algorithm able to detect defect only on the scratch area and able to read the Ga value at detected scratch line and transform it to surface roughness measurement at considerably good level of accuracy compared with manual method. …”
Get full text
Get full text
Thesis
