Search Results - (( rate detection method algorithm ) OR ( parameter simulation based algorithm ))
Search alternatives:
- parameter simulation »
- method algorithm »
- simulation based »
- rate detection »
-
1
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
2
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The results of bit error rate simulation have shown that reduced rank-JCE based detectors have an improvement by 5 dB lower than other traditional full rank-JCE based detectors.…”
Get full text
Get full text
Article -
3
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
4
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The results of bit error rate simulation have shown that reduced rank-JCE based detectors have an improvement by 5 dB lower than other traditional full rank-JCE based detectors.…”
Get full text
Get full text
Article -
5
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Results show that the proposed method is able to detect islanding conditions with 100% accuracy, 100% detection rate and 0% false alarm with detection time of less than 0.19s. …”
Get full text
Get full text
Thesis -
6
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…In this method of analysis the exponential signal is converted to a convolution model whose input is a train of weighted delta function that contains the signal parameters to be determined.The resolution of the estimated decay rates is poor if the conventional fast Fourier transform (FFT) algorithm is used to analyse the resulting deconvolved data. …”
Get full text
Get full text
Get full text
Article -
7
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The results of bit error rate simulation have shown that reduced rank-JCE based detectors have an improvement by 5 dB lower than other traditional full rank-JCE based detectors.…”
Get full text
Get full text
Article -
8
A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification
Published 2020“…Based on the 15 benchmark industrial loops with stiction, the proposed BSD-CNN quantification algorithm has shown reasonable accuracy when compared to other published quantification methods in literature. …”
Get full text
Get full text
Article -
9
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
10
Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption
Published 2024“…Our quantitative tests show that the improved model has the best coverage (95.3%, 84.3% and 65.8%, respectively) compared to two other methods Levy Flight (LF) algorithm and Particle Swarm Optimization (PSO), which use the same initial parameter values. …”
Article -
11
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…The performance of this classifier was evaluated based on three parameters: accuracy, sensitivity, and False Positive Rate (FPR). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Development of new code for optical code division multiple access systems
Published 2011“…The study is carried out using a theoretical calculation, and simulation experiment. The simulations are carried out using various design parameters namely; distance, bit rate, input power and chip spacing. …”
Get full text
Thesis -
13
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…Simulation works and numerical examples prove that the newly proposed RDF outperforms existing methods with the lowest rates of swamping. …”
Get full text
Get full text
Thesis -
14
A novel islanding detection technique using modified Slantlet transform in multi-distributed generation
Published 2019“…In this paper, a new hybrid islanding detection scheme based on a combination of a modified Slantlet Transform (MSLT) and machine learning is applied to a passive time frequency islanding detection of multiple distributed generation units. …”
Get full text
Get full text
Get full text
Article -
15
Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi
Published 2016“…Accordingly, in the second part of this research, the procedure of structural identification and damage detection has been developed by employing the wavelet-based method through the modified genetic algorithms (GAs) to optimally solve inverse problems. …”
Get full text
Get full text
Thesis -
16
Deep Learning Based image segmentation for expensive soil desiccation crack recognition and qualification
Published 2025“…This study investigated the feasibility and effectiveness of image-based techniques using advanced deep learning algorithms to quantify desiccation cracks in expansive soils. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on Singular Value Decomposition (SVD). The proposed method has declared the superiority over the conventional methods that are being used in the current applications of TD-SCDMA systems. …”
Get full text
Get full text
Thesis -
18
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
Get full text
Get full text
Thesis -
19
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
20
A simulation based fly optimisation algorithm for swarms of mini autonomous surface vehicles application
Published 2011“…The optimal simulation parameters can be used for the real application. …”
Get full text
Get full text
Get full text
Article
