Search Results - (( parameters detection method algorithm ) OR ( based solution using algorithm ))
Search alternatives:
- parameters detection »
- method algorithm »
- using algorithm »
- based solution »
- solution using »
-
1
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…The PD data acquired from electrical method was used to test the FPDI. The comparison was made based on the less hardware used for detection while sustain the identification accuracy. …”
Get full text
Get full text
Thesis -
3
-
4
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…Not to say the difficulty in deploying either artificial intelligence or deep learning in embedded environments due to significant parameters size and computational complexity. In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
Get full text
Get full text
Article -
6
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
7
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Power System State Estimation In Large-Scale Networks
Published 2010“…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
Get full text
Get full text
Thesis -
9
Defect detection of GFRP composites through long pulse thermography using an uncooled microbolometer infrared camera
Published 2024“…The TC success rate reached 0.91 for detecting FBH depth defects in raw images, which improved significantly after post-processing using Canny edge detection and Hough circle detection algorithms. …”
Get full text
Get full text
Get full text
Article -
10
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…Only one dynamic variable is used as a tuning parameter reducing the complexity of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Data stream clustering by divide and conquer approach based on vector model
Published 2016“…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
Get full text
Get full text
Article -
13
Proposed conceptual Iot-based patient monitoring sensor for predicting and controlling dengue
Published 2023“…Based on the review, this paper outlines the parameters that will be used in dengue for analyzing purposes. …”
Article -
14
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
15
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
16
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
17
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
18
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
20
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
