Search Results - (( program implementation using algorithm ) OR ( parameter detection system algorithm ))
Search alternatives:
- program implementation »
- implementation using »
- parameter detection »
- system algorithm »
- using algorithm »
-
1
Diagnosis of eyesight using Improved Clonal Selection Algorithm (ICLONALG) / Nor Khirda Masri
Published 2017“…Therefore, in order to provide the excellent eyesight’s problem care, it needs an intelligent diagnostic of the eyesight to detect the classification of eyesight diseases. This study aims to implement the classification algorithm using the Improved Clonal Selection Algorithm (ICLONALG) to classify the eyesight’s problems. …”
Get full text
Get full text
Thesis -
2
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…The whole system has been developed using Microsoft Visual C++ programming language. …”
Get full text
Get full text
Article -
3
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…This project also implements colored object recognition technique using its color and size without edge detection process along with a self-calibration technique for detecting object location without any parameter of the camera by using only two reference points. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
Get full text
Get full text
Thesis -
5
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…Therefore, two automated procedures are developed to determine these parameters iteratively. The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
Get full text
Get full text
Thesis -
6
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. …”
Get full text
Get full text
Get full text
Article -
8
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
9
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
10
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
11
-
12
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…Analytical redundancy based fault detection system generally requires an accurate model. …”
Get full text
Conference or Workshop Item -
13
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…The recommended system’s parameters were assessed, which demonstrated its superiority versus other previously developed systems. …”
Get full text
Get full text
Article -
14
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
15
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Therefore, the aim of the study is to identify a fast, simple, and reliable method of FD on GCPV system in Malaysia. The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis -
16
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. …”
Get full text
Get full text
Get full text
Article -
17
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…Fuzzy system is a rule-based system by using human experts which hold the truth values or membership values to make a particular decision while fuzzy modelling is a process of identifying the fuzzy parameter. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
19
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
20
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article
