Search Results - (( program implementation based algorithm ) OR ( parameter detection based algorithm ))
Search alternatives:
- program implementation »
- implementation based »
- parameter detection »
- detection based »
-
1
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…The purpose of this study is to apply the K-Means algorithm to perform clustering on COVID-19 data to determine the high spread of the virus in regions in Indonesia based on the frequency of the data. …”
Get full text
Get full text
Book Section -
2
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
3
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…This project also implements colored object recognition technique using its color and size without edge detection process along with a self-calibration technique for detecting object location without any parameter of the camera by using only two reference points. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
Get full text
Get full text
Thesis -
5
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
7
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…Proposed method returns one value of stiffness deterioration based on the considered set of modes, without affecting the sensitivity of damage detection algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
11
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
12
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
13
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
14
-
15
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…This algorithm is based on two detection schemes; namely active and passive. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…Analytical redundancy based fault detection system generally requires an accurate model. …”
Get full text
Conference or Workshop Item -
17
A new corner detection algorithm for chain code representation.
Published 2005“…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
Get full text
Get full text
Article -
18
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Moreover, the study also pointed out the limitations of the manual and automatic crack detection system and underlined the fact that flight planning is one of the most critical parameters in the context of UAV-based inspections. …”
Get full text
Get full text
Student Project -
19
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
Get full text
Get full text
Article -
20
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…The objective of this paper is to describe the implementation of autonomous navigation through the use of event-driven programming technique which was based on finite state machines (FSM). …”
Get full text
Get full text
Conference or Workshop Item
