Search Results - (( parameter detection method algorithm ) OR ( user optimization method algorithm ))*

Refine Results
  1. 1
  2. 2

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…The developed algorithm for the crosstalk recordings detection shows ability in determining the presence of the overlapped measurements period. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Modeling of road geometry and traffic accidents by hierarchical object-based and deep learning methods using laser scanning data by Sameen, Maher Ibrahim

    Published 2018
    “…Experimental results regarding road geometry extraction indicated that the proposed methods could achieve relatively high accuracy (~ 85% - User’s Accuracy) of road detection from airborne laser scanning data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…We often see many of the method of Genetic Algorithm (GA), Ant Colony Optimization (ACO), Simulated Annealing Algorithm (SAA) and PSO are used for any optimization problems. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
    Get full text
    Get full text
    Article
  15. 15

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks by Iranpanah, Havzhin

    Published 2017
    “…A search method with numerous advantages over conventional algorithms, has been designed to solve the optimization problems with an enhanced global optimality and convergence speed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…The switching state pattern is selected according to peak to peak value of CMV and CMV weighting factor is related to peak value of CMV and a user defined co-efficient. The stability of the system is ensured through Lyapunov function with the help of backsteping control method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20