Search Results - (( variable detection method algorithm ) OR ( using virtualization technique algorithm ))
Search alternatives:
- virtualization technique »
- using virtualization »
- variable detection »
- method algorithm »
-
1
Modeling of cupping suction system based on system identification method
Published 2022“…The mathematical modelling for cupping design shown in this study is rather excellent. Using system identification techniques, this paper came up with a way to pick a mathematical model for a cupping suction system that would meet the needs of the controller. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Optimal path planning algorithms in virtual environments
Published 2006“…In addition, Extended Prim algorithm was applied to shorten the travelling time and a virtual exhibition area was used as a domain to execute and analyse the algorithms performances. …”
Get full text
Get full text
Thesis -
3
-
4
Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application
Published 2013“…Thus, in this paper we presented our novel algorithm for constructing Bounding-Volume Hierarchies using Quad Splitting method. …”
Get full text
Get full text
Article -
5
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…This thesis presents a collision detection algorithm for accurate simulation of a virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
6
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The results obtained from the simulation study and real data sets indicate that the proposed method possesses high detection power with minimal misclassification error compared to the MRCD and MDP methods. …”
Get full text
Get full text
Thesis -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
8
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Enhanced location and positioning in wimax networks with virtual mimo base station
Published 2015“…Furthermore, a new hybrid algorithm enhancement of mobile station (MS) location estimation by using a single MIMO base station (SMBS) with the virtual base station has been introduced. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
11
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
12
A real time road marking detection system on large variability road images database
Published 2017“…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
Get full text
Get full text
Conference or Workshop Item -
13
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis -
14
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
Get full text
Get full text
Get full text
Thesis -
15
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
16
Virtual force field algorithm for a behaviour-based autonomous robot in unknown environments
Published 2011“…The FL algorithm is used for velocity control based on sonar readings. …”
Get full text
Get full text
Get full text
Article -
17
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
18
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Results showed that the developed FDD algorithm successfully detect and diagnosed the pre-designed faults. …”
Get full text
Get full text
Monograph -
19
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
Get full text
Get full text
Get full text
Article -
20
Improved Location And Positioning Utilizing Single MIMO Base Station In IMT-Advanced System
Published 2016“…The Single MIMO Base Station (SMBS) in mobile WiMAX is combined with a virtual technique, known as the Virtual Base Stations, created a novel algorithm for location and positioning (L&P) purposes. …”
Get full text
Get full text
Get full text
Article
