Search Results - (( solution construction method algorithm ) OR ( variable detection sensor algorithm ))

Refine Results
  1. 1

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…Also, a scoring algorithm has been implemented, to evaluate the classification ability of the algorithm and the early fault detection ability. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach by Phua, Mui How, Tsuyuki, Satoshi

    Published 2004
    “…This paper examines use of multi-sensor remote sensing approach for deforestation detection in the tropics. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  5. 5

    Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network by Karimi, Abbas, Abedini, S. M., Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2013
    “…Wireless sensor networks (WSNs) are composed of hundreds or thousands of sensor nodes in order to detect and transmit information from its surrounding environment. …”
    Get full text
    Get full text
    Article
  6. 6

    Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory by Ng, Peng Hong

    Published 2015
    “…State observers are then implemented as the fault detection method in which the discrepancies between the measured values by the sensors and the values of the model are expressed as residuals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS by MUHAMMAD AMIR AFIQ, MOHAMED

    Published 2018
    “…Density of the traffic is calculated by the algorithm that have various variables. This project will use Arduino as it microcontroller and the ultrasonic is used to detect the congestion. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8
  9. 9

    Faulty sensor detection mechanism using multi-variate sensors in IoT by Al-Atrakchii, Khaldoon Ammar

    Published 2019
    “…Because of this, we proposed two methods for Faulty Sensor Detection and Identification mechanism based on multi-variate sensors for Smart Parking System and smart agriculture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Sequential constructive algorithm incorporate with fuzzy logic for solving real world course timetabling problem by Tan, Li June, Joe H. Obit, Leau, Yu Beng, Jetol Bolongkikit, Rayner Alfred

    Published 2020
    “…Sequential constructive algorithm is one of the popular methods for solving timetabling problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13
  14. 14

    Gas Identi cation by Using a Cluster-k-Nearest-Neighbor by Brahim Belhaouari, samir

    Published 2009
    “…Among the most serious limitations facing the success of future consumer gas identification systems are the drift problem and the real-time detection due to the slow response of most of todays gas sensors. …”
    Get full text
    Get full text
    Article
  15. 15

    Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems by Nazif, Habibeh

    Published 2010
    “…A Genetic Algorithm is successful in generating near -optimal solutions if it is able to produce o®spring during crossover that is better than the parent solutions. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…For this operation, if sensor detect obstacle, robot will move direction no restriction to reach to last post.…”
    Get full text
    Learning Object
  17. 17

    Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems by Bashar AbedAl Mohdi Talal AlDeeb

    Published 2024
    “…(iii) It is a constructive-based meta-heuristic algorithm which means, the solution is incrementally constructed (step by step) until the complete solution is obtained (Noferesti and Shah-Hosseini, 2012). …”
    thesis::doctoral thesis
  18. 18

    Centered fan field region under wedge indentation by numerical solution method by Syafikah, Ayob, Nor Alisa, Mohd Damanhuri

    Published 2019
    “…The stress field obtained were then compared to the analytical solution. This solution method provides a simple algorithms that is easy to be applied in deformation and this will subsequently provide a contribution in designing tools and the construction industries involving granular materials.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a Negotiation Support Model for Value Management in Construction by UTOMO, CHRISTIONO

    Published 2009
    “…It combines simultaneous triangulation by using case studies and survey methods and sequential triangulation in which results of one method are essential in planning the next method (theoretical mapping, survey research, focus group, case study and conceptual modeling). …”
    Get full text
    Get full text
    Final Year Project