Search Results - (( using simulation machine algorithm ) OR ( using identification using algorithm ))
Search alternatives:
- using identification »
- identification using »
- machine algorithm »
- using algorithm »
-
1
Optimization of drilling path using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Article -
2
The development of virtual product life cycle design tool using artificial intelligence technique
Published 2008“…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
Get full text
Monograph -
3
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Using a range flows from 1000 to 100000 with an increment of 10000 flows per step in two network topologies namely, Fat Tree and Simple Tree Topologies, that were created using the Mininet simulator and connected to the Ryu controller, the performance of the proposed algorithms was evaluated for efficiency and effectiveness across a variety of evaluation metrics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Wavelet network based online sequential extreme learning machine for dynamic system modeling
Published 2013“…The proposed model used as system identification for nonlinear dynamic systems. …”
Get full text
Conference or Workshop Item -
6
Fault classification in smart distribution network using support vector machine
Published 2023“…In this paper, a machine-learning algorithm known as Support Vector Machine (SVM) for fault type classification in distribution system has been developed. …”
Article -
7
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…Moreover, the ability of initialization the hidden nodes parameters using density function and recursive algorithm will help WN-OSELM to perform useful generalization facility and modeling accuracy. …”
Get full text
Get full text
Thesis -
8
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…Firstly, to identify the mathematical model of machine tool for XY table using system identification technique through frequency response function (FRF) of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Robust and adaptive control with application to mechanical systems
Published 2009Get full text
Working Paper -
10
Control of pallets in automatic storage and retrieval system
Published 2009“…Array of Limit Switches are used for pallet identification. In the simulation, the rack and pinion mechanism is used to provide a substitute to the storage and retrieval machine used in AS/RS. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems
Published 2021“…After the processes of feature selection, the fault-location indicator is recognized by the support vector machines (SVMs). To examine and validate the proposed methodology, various fault types in a sample power system are simulated by using the electromagnetic transient program (EMTP). …”
Get full text
Get full text
Get full text
Article -
12
Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems
Published 2020“…After the processes of feature selection, the fault location indicator is recognized by the support vector machines (SVMs). To examine and validate the proposed methodology for constructing power transmission networks, various fault types are simulated by using electromagnetic transients program (EMTP). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Development of damage identification scheme using de-noised modal frequency response function data with artificial neural network / Mohamad Izzudin Hussein Shah
Published 2018“…Damaged identification scheme is used to monitor and locate the damage on a structure. …”
Get full text
Get full text
Thesis -
14
A Neighborhood and Machine Learning-Enabled Information Fusion Approach for the WSNs and Internet of Medical Things
Published 2022“…For this purpose, the proposed data aggregation scheme is divided into two phases: (i) identification of neighboring nodes, which is based on the MAC address and location, and (ii) data aggregation using k-mean clustering algorithm and Support Vector Machine (SVM). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
17
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…The RX_myKarve is an extended framework from X_myKarve, which consists of the following key components: (i) an Extreme Learning Machine (ELM) neural network for clusters classification using three existing content-based features extraction (Entropy, Byte Frequency Distribution (BFD) and Rate of Change (RoC)) to improve the identification of JPEG images content and support the reassembling process; (ii) a genetic algorithm with Coherence Euclidean Distance (CED) matric and cost function to reconstruct a JPEG image from a set of deformed and fragmented clusters in the scan area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Self-Adaptive Autoreclosing Scheme usingI Artificial Neural Network and Taguchi's Methodology in Extra High Voltage Transmission Systems
Published 2009“…In addition, Taguchi's methodology is employed in optimizing the parameters of each algorithm used for training, and in deciding the number of hidden neurons of the neural network. …”
Get full text
Get full text
Thesis -
19
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…Standard base machine learning algorithms, which include a total of twelve individual methods as well as the AdaBoost and Bagging methods, are firstly used. …”
Get full text
Get full text
Get full text
Thesis -
20
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks. …”
Get full text
Get full text
Get full text
Get full text
Article
