Search Results - (( variable detection new algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- variable detection »
- using codification »
- codification using »
- using algorithm »
- detection new »
- new algorithm »
-
1
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. …”
Get full text
Get full text
Article -
2
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
3
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
4
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
5
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
6
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
7
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
8
Robust Estimation Methods And Outlier Detection In Mediation Models
Published 2010Get full text
Get full text
Thesis -
9
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…We find 98.7% of accuracy in the classification of 6 different types of Gas by using K-means cluster algorithm and we find almost the same by using the new clustering algorithm.…”
Get full text
Get full text
Article -
10
Predicting Survey Responses: How and Why Semantics Shape Survey Statistics on Organizational Behaviour
Published 2014“…Some disciplines in the social sciences rely heavily on collecting survey responses to detect empirical relationships among variables. We explored whether these relationships were a priori predictable from the semantic properties of the survey items, using language processing algorithms which are now available as new research methods. …”
Get full text
Get full text
Get full text
Article -
11
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
Get full text
Get full text
Thesis -
12
An Automated Method For Model-Plant Mismatch Detection And Correction In Process Plants Employing Model Predictive Control (MPC)
Published 2012“…When the mismatch indicated by the variable (e/u) exceeds the threshold limit, auto-correction of the model gain of the controller is made to match with the new plant gain. …”
Get full text
Get full text
Final Year Project -
13
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
Get full text
Get full text
Get full text
Book Chapter -
14
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…When the environment is changed the algorithm may fail to adapt itself to the new configuration. …”
Get full text
Get full text
Final Year Project -
15
Video surveillance: explosion detection
Published 2025“…By leveraging three motion-based variables, including motion ratio, new pixel ratio and optical flow values, together with three detection approaches, namely global detection, non-eroded detection and eroded detection, the system demonstrates the effectiveness of motion based methods in detecting explosions at an early stage with acceptable performance. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Development of new code for optical code division multiple access systems
Published 2011“…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
Get full text
Thesis -
17
-
18
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…We propose an optimized crossover scheme that changes the crossover operation from being fixed-length to random-length, which has been designed to fit for the proposed variable length DE. We refer to the new DE algorithm as random variable length crossover DE (rvlx- DE) algorithm. …”
Get full text
Get full text
Thesis -
19
Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad
Published 2017“…Thus, this work investigates the role of sharpening and AHE based image enhancement in reducing variability among the evaluation. New rule using existing standard deviation (std = 0) is utilized to determine the dentists' decision on the image quality and detected abnormalities. …”
Get full text
Get full text
Thesis -
20
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
Get full text
Get full text
Thesis
