Search Results - (( using simulation method algorithm ) OR ( software detection method algorithm ))
Search alternatives:
- software detection »
- simulation method »
- method algorithm »
-
1
Experimental evaluation of data fusion algorithm for residual generation in detecting UAV servo actuator fault
Published 2023“…Algorithms; Data fusion; Hardware; Military vehicles; Redundancy; Software reliability; Unmanned aerial vehicles (UAV); Analytical redundancy; Data fusion algorithm; Experimental evaluation; Fault detection algorithm; Hostile environments; Model reference methods; On-board fault detection; Software and hardwares; Fault detection…”
Article -
2
Web Camera Application For Motion Detection
Published 2003“…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
3
A lower complexity k best algorithm for multiple input and multiple output detection
Published 2011“…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
CDRA: A Community Detection based Routing Algorithm for Link Failure Recovery in Software Defined Networks
Published 2021“…Multiple research studies have discussed this problem by using a variety of techniques. Among them is the use of the community detection method is one of the failure recovery technique for SDN. …”
Get full text
Get full text
Article -
5
Efficient distance computation algorithm between nearly intersected objects using dynamic pivot point in virtual environment application
Published 2014Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Efficient distance computation algorithm between nearly intersect objects using dynamic pivot point in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
8
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…This article presents a method to generate new March algorithms that provide optimum coverage on faults introduced by the nanometer process technologies. …”
Get full text
Get full text
Get full text
Article -
9
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Hardware-based solutions such as radars and LIDAR are been proposed but are too expensive to be maintained and produce little valuable information to human operators at traffic monitoring systems. Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Computerized segmentation of sinus images
Published 2009“…The software used for simulations is Matlab. Simulations were performed on images of healthy sinuses and sinuses with sinusitis. …”
Get full text
Get full text
Conference or Workshop Item -
12
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The whole constraint analyzer and the fitness function were combined with four SBTs (genetic algorithm, evolutionary algorithm, simulating annealing, and quantum genetic algorithm). …”
Get full text
Get full text
Get full text
Thesis -
13
Failure detection analysis of grid-connected photovoltaic system using an improved comparative based method / Fatin Azirah Mohd Shukor
Published 2022“…Numerous studies have reported FD analysis algorithm using comparative based method (CBM), but limitedly demonstrate the FD analysis sequence that will finally determine the type of failure occurred in the GCPV system. …”
Get full text
Get full text
Thesis -
14
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Article -
15
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
17
Application of neural networks in early detection and diagnosis of parkinson's disease
Published 2014“…This MLFNN with BP algorithm is simulated using MATLAB software. The dataset information used in this study was taken from the Oxford Parkinson’s Disease Detection Dataset. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Distance computation between convex objects using axis-aligned bounding-box in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis
