Search Results - (( using selection method algorithm ) OR ( based constructing detection algorithm ))
Search alternatives:
- constructing detection »
- based constructing »
- selection method »
- method algorithm »
- using selection »
-
1
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Get full text
Article -
2
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Article -
3
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
4
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
5
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article -
6
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…For Method 2, suitable solid DBs are used to provide higher fault coverage instead of using the existing MTA. …”
Get full text
Get full text
Thesis -
7
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…For this purpose, this study used the intensification and diversification properties of the recently proposed moth-flame optimisation (MFO) algorithm and utilised the algorithm in the proposed feature selection scheme. …”
Get full text
Get full text
Get full text
Article -
8
-
9
New CFAR algorithm and circuit development for radar receiver
Published 2020“…Therefore, the MSS-CA-CFAR is chosen to implement by practical digital circuit and there is another important feature in the MSS-CFAR algorithm that is parallel processing since the spike selection process is done at the same time with summing of samples process that makes this algorithm much less in processing time from any other algorithm using the same environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Article -
11
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad
Published 2018“…A metaheuristic algorithm in the UFLS scheme can be used to select the best load combination in real time. …”
Get full text
Get full text
Get full text
Thesis -
13
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
14
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
Get full text
Get full text
Get full text
Article -
15
Obstacle detection for Unmanned Aerial Vehicle (UAV)
Published 2022“…In algorithm development and filtration is used to improve the accuracy of the feature matching process, which is required for classifying the obstacle region and free region of any texture obstacle. …”
Get full text
Get full text
Get full text
Article -
16
Development of new code for optical code division multiple access systems
Published 2011“…Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
Get full text
Thesis -
17
Automatic recognition of freshwater algae (Oscillatoria sp.) using image processing techniques with artificial neural network approach / Awatef Saad Salem Saad
Published 2012“…Computer-based image analysis and pattern recognition methods were used to construct a system that is able to identify, and classify selected Cyanobacteria genus automatically. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Delamination in fiberglass pre-impregnated laminated composites from ultrasonic a-scan signal using artificial intelligence
Published 2018“…Besides affected the material strength and structural reliability, this failure mode normally present minor damage on the surface but the internal damage may extensive. Existing detection method using static and dynamic load response have limitations that are considered static based monitoring and require the sensor to be attached to the test specimen surface. …”
Get full text
Get full text
Thesis -
19
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Most existing methods deal with the detection of an action after its completion. …”
Get full text
Get full text
Thesis -
20
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis
