Search Results - (( simulation optimization based algorithm ) OR ( data detection method algorithm ))
Search alternatives:
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
2
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
3
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
4
Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm
Published 2025“…Consequently, this paper proposes a method to improve the detection accuracy of You Only Look Once version 8 (YOLOv8) using Salp Swarm Algorithm (SSA) for hyperparameter optimization, focusing on eight key parameters. …”
Get full text
Get full text
Get full text
Article -
5
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The second contribution of this thesis is developing an accurate search-based test data generator for generating automatically optimal test data to satisfy the whole constraints in the path. …”
Get full text
Get full text
Get full text
Thesis -
6
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
7
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Article -
8
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Reduced complexity optimum detector for block data transmission systems
Published 2010Get full text
Article -
10
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
Get full text
Get full text
Thesis -
11
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
Get full text
Get full text
Get full text
Article -
12
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…Not much research has been done on method of detecting HLPs for panel data. Hence, we have proposed Robust Diagnostic-F (RDF) to remedy the problem of masking and swamping in detecting HLPs. …”
Get full text
Get full text
Thesis -
13
An efficient unknown detection approach for RFID data stream management system
Published 2025“…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article -
14
Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques
Published 2003“…An improved method that is based of the combination of Gardner transformation, optimal compensation deconvolution, and signal modelling techniques is suggested in this paper. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007Get full text
Get full text
Get full text
Book Section -
17
A Time-Domain Subspace Technique for Estimating Visual Evoked Potential Latencies
Published 2010“…The simulation results produced by the GSA algorithm show more faithful reproduction of VEP waveforms, and a higher degree of consistencies in detecting the P100, P200, and P300 peaks. …”
Get full text
Get full text
Get full text
Citation Index Journal -
18
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning-based item classification for retail automation
Published 2025“…Real-time processing was achieved through the integration of object detection algorithms like YOLO and image segmentation techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…The developments of algorithms for these methodologies are undertaken, which are fundamentally based on ray-tracing approach and SIRT. …”
Get full text
Get full text
Thesis
