Search Results - (( variable detection based algorithm ) OR ( variable equations using algorithm ))

Refine Results
  1. 1

    Robust Estimation Methods And Outlier Detection In Mediation Models by Fitrianto, Anwar

    Published 2010
    “…Mediation models refer to the relationships among three variables: an independent variables (IV), a potential mediating variable (M), and a dependent variable (DV). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…In the developed algorithm, a Newton divided difference interpolation has been used in approximating a non-vanishing delay, whilst a new approach that is based on an adaptation of predictor-corrector scheme has been used to handle the vanishing delay problems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW by Sadeghi, Mir Bahram H.

    Published 1996
    “…Weld process parameters such as base current and time, pulse current and time, electrode tip to workpiece distance, filler traveling speed, torch speed and workpiece thickness were used for finding the equations which describe the interrelationship between the aforementioned variables and penetration depth as well as bead width. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Hence. SE requires to use various techniques to ensure validity of the results and to detect and identify sources of errors. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…The proposed control algorithm takes advantage of a predefined Lyapunov control law which minimizes the required calculation time by the Lyapunov model equations just once in each control loop to predict future variables. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Study on numerical solution of a variable order fractional differential equation based on symmetric algorithm by Liu, Jingrui, Pan, Dongyang

    Published 2019
    “…A fully symmetric classification of the boundary value problem for a class of fractional differential equations with variable sequences is determined by using a fully symmetric differential sequence sorting algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…Thus, this study aims to develop an algorithm for model selection in multiple equations focusing on seemingly unrelated regression equations (SURE) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  16. 16

    Variable order variable stepsize algorithm for solving nonlinear Duffing oscillator by Rasedee, Ahmad Fadly Nurullah, Ishak, Norizarina, Hamzah, Siti Raihana, Ijam, Hazizah Mohd, Suleiman, Mohamed, Ibrahim, Zarina Bibi, Sathar, Mohammad Hasan Abdul, Ramli, Nur Ainna, Kamaruddin, Nur Shuhada

    Published 2017
    “…In this research, a numerical approximation for solving the Duffing oscillator directly is introduced using a variable order stepsize (VOS) algorithm coupled with a backward difference formulation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey