Search Results - (( using function method algorithm ) OR ( time detection method algorithm ))

Refine Results
  1. 1

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Mohd Sharif, Zakaria, Mohammad Fadhil, Abas, Fatimah, Dg Jamil, Norhafidzah, Mohd Saad, Addie, Irawan, Pebrianti, Dwi

    Published 2024
    “…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Zakaria, Mohd Sharif, Abas, Mohammad Fadhil, Dg Jamil, Fatimah, Mohd Saad, Norhafidzah, Hashim, Addie Irawan, Pebrianti, Dwi

    Published 2024
    “…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3
  4. 4

    Skin region detector for real time face detection system by Mohd Mustafah, Yasir, Azman, Amelia Wong

    Published 2012
    “…In the implementation, the region of interest is detected using two algorithms, running in parallel. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2018
    “…The merging of these two methods enables the algorithm to distinguish between hand open and hand close activities by using sEMG signal collected by only one channel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  9. 9

    A multimodal biometric detection system via rotated histograms using hough lines by Fatma Susilawati, Mohamad, Zahraddeen, Sufyanu

    Published 2015
    “…The new system outperformed many methods in the literature reported using conventional detection methods. …”
    Get full text
    Get full text
    Article
  10. 10

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Neural network algorithm-based fall detection modelling by Mohd Yusoff, Ainul Husna, Koh, Cheng Zhi, Ngadimon, Khairulnizam, Md Salleh, Salihatun

    Published 2020
    “…This article presents results of modelling for fall detection system by using nonlinear autoregression neural network NARnet algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The whole constraint analyzer and the fitness function were combined with four SBTs (genetic algorithm, evolutionary algorithm, simulating annealing, and quantum genetic algorithm). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population by Chahed, Norashikin, Dzulkarnain, Ahmad Aidil Arafat, Jamaluddin, Saiful Adli

    Published 2021
    “…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article