Search Results - (( parameter detection path algorithm ) OR ( normal distribution function algorithm ))*
Search alternatives:
- parameter detection »
- function algorithm »
- detection path »
- path algorithm »
-
1
Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion
Published 2020“…The path generation algorithm was fully derived within the local maps and tested with a WMR platform in real-time.…”
Get full text
Get full text
Get full text
Article -
2
Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control
Published 2018“…The sensor fusion algorithm is used to remove noises and uncertainties from sensors' data and provide optimum measurements for path planning. …”
Get full text
Get full text
Get full text
Article -
3
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
4
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…For this purpose, the normal distributions are applied to each class. The parameters of this distribution are optimized by applying the proposed MOHA. …”
Get full text
Get full text
Thesis -
5
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
6
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
7
Robust Kernel Density Function Estimation
Published 2010“…To do this evaluation, the mixtures of bivariate normal distribution with different percentage of contribution are simulated. …”
Get full text
Get full text
Thesis -
8
Profit-based optimal generation scheduling of a microgrid
Published 2023“…grid). Current methods normally assume either islanded operation, or utilitygrid connected ?…”
Conference paper -
9
A novel bio-inspired routing algorithm based on ACO for WSNs
Published 2019“…The issue of path selection to reach the nodes and vital correspondence parameters, for example, the versatility of nodes, their constrained vitality, the node residual energy and route length are considered since the communications parameters and imperatives must be taken into account by the imperative systems that mediate in the correspondence procedure, and the focal points of the subterranean insect framework have been utilized furthermore. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Modeling The Modified Internal Rate Of Return (Mirr) For Long-Term Investment Strategy By The Assumption Of Gamma Distribution
Published 2023“…It offers greater flexibility compared to the commonly used normal distribution.…”
Get full text
Get full text
Thesis -
11
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Article -
12
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Thesis -
13
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Results presents traffic characterizations are identified based on two (2) parameters Cumulative Distribution Functions (CDF) traffic model. Maximum Likelihood Estimator (MLE) technique is used to fit the best distribution model. …”
Get full text
Get full text
Article -
14
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Results presents traffic characterizations are identified based on two (2) parameters Cumulative Distribution Functions (CDF) traffic model. Maximum Likelihood Estimator (MLE) technique is used to fit the best distribution model. …”
Get full text
Get full text
Thesis -
15
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018“…Normalized Ikaz is recommended and advised to be implemented as automatic selection of intrinsic mode function (IMF) through NHHT analysis.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…The PSO inverse technique is then applied to the magnetization curve to construct the magnetic moment distribution. A multimodal normalized log-normal distribution was used in the minimization of the objective function of the PSO inversion technique, and a modification of the PSO search region is proposed to improve the exploration and exploitation of the PSO particles. …”
Get full text
Get full text
Get full text
Article -
17
A Study of Ikaz and Normalized Hilbert transform for solving faulty in pipeline distribution system using transmission line modelling
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis -
19
Optimisation of distributed generation in electric power systems using fuzzy-genetic algorithm approach
Published 2011“…This model takes into account, the peculiarities of radial distribution networks, such as high R/X (resistance/reactance) ratio, voltage dependency and composite nature of loads.To solve the proposed models, Genetic algorithm (GA) is used as an optimisation technique. …”
Get full text
Get full text
Thesis -
20
Mobile robot safe navigation in unknown environment
Published 2012“…The information about the target and the low-range sensory information are used by the controller to produce the commands that gives a favorable direction in terms of reaching to the target within the collision detection. Furthermore, the mobile robot does not suffer from typical ushape environment by a planned local minimum trapping algorithm and also designed controller is easy to understand, simple, and not sensitive to the system model parameters. …”
Get full text
Conference or Workshop Item
