Search Results - (( variable detection new algorithm ) OR ( java application modified algorithm ))

Refine Results
  1. 1
  2. 2

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. …”
    Get full text
    Get full text
    Article
  3. 3

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  4. 4

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  6. 6

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud, Moamin Ahmed, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mustapha, Aida, Mohd Yusoff, Mohd Zaliman, Abdul Hamid, Nurzeatul Hamimah

    Published 2013
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
    Get full text
    Get full text
    Article
  7. 7

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Gas Identi cation by Using a Cluster-k-Nearest-Neighbor by Brahim Belhaouari, samir

    Published 2009
    “…We find 98.7% of accuracy in the classification of 6 different types of Gas by using K-means cluster algorithm and we find almost the same by using the new clustering algorithm.…”
    Get full text
    Get full text
    Article
  12. 12

    Predicting Survey Responses: How and Why Semantics Shape Survey Statistics on Organizational Behaviour by Jan, Ketil Arnulf, Kai, Rune Larsen, Øyvind, Lund Martinsen, Bong, Chih How

    Published 2014
    “…Some disciplines in the social sciences rely heavily on collecting survey responses to detect empirical relationships among variables. We explored whether these relationships were a priori predictable from the semantic properties of the survey items, using language processing algorithms which are now available as new research methods. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An Automated Method For Model-Plant Mismatch Detection And Correction In Process Plants Employing Model Predictive Control (MPC) by Ahmed Bahakim, Sami Saeed

    Published 2012
    “…When the mismatch indicated by the variable (e/u) exceeds the threshold limit, auto-correction of the model gain of the controller is made to match with the new plant gain. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation by Kamal Z., Zamli, Ahmed, Bestoun S., Mahmoud, Thair, Afzal, Wasif

    Published 2018
    “…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  16. 16

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…When the environment is changed the algorithm may fail to adapt itself to the new configuration. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Video surveillance: explosion detection by Lee, Shao Yuan

    Published 2025
    “…By leveraging three motion-based variables, including motion ratio, new pixel ratio and optical flow values, together with three detection approaches, namely global detection, non-eroded detection and eroded detection, the system demonstrates the effectiveness of motion based methods in detecting explosions at an early stage with acceptable performance. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
    Get full text
    Thesis
  19. 19
  20. 20

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…We propose an optimized crossover scheme that changes the crossover operation from being fixed-length to random-length, which has been designed to fit for the proposed variable length DE. We refer to the new DE algorithm as random variable length crossover DE (rvlx- DE) algorithm. …”
    Get full text
    Get full text
    Thesis