Search Results - (( variable detection process algorithm ) OR ( evolution optimization bat algorithm ))
Search alternatives:
- evolution optimization »
- variable detection »
- detection process »
- process algorithm »
- optimization bat »
- bat algorithm »
-
1
Multi-Swarm bat algorithm
Published 2023“…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
Article -
2
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2017“…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
Get full text
Get full text
Thesis -
3
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
4
Fault diagnostic algorithm for precut fractionation column
Published 2004“…This paper presents an algorithm which can be used to detect and diagnose unexpected process faults in the operation of fatty acid precut fractionation column. …”
Get full text
Get full text
Conference or Workshop Item -
5
Fault detection and diagnosis for gas density monitoring using multivariate statistical process control
Published 2011“…Therefore, an efficient fault detection and diagnosis algorithm needs to be developed to detect faults that are present in a process and pinpoint the cause of these detected faults. …”
Get full text
Get full text
Get full text
Article -
6
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
7
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
Get full text
Get full text
Thesis -
8
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
Get full text
Get full text
Thesis -
9
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
10
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
11
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
12
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…Although the scheme was developed based on data of fatty acid precut fractionation column, the algorithm of fault detection and diagnosis can be extended to other chemical process by changing the x-MR chart and HAZOP for each selected monitoring variables.…”
Get full text
Get full text
Thesis -
13
An Automated Method For Model-Plant Mismatch Detection And Correction In Process Plants Employing Model Predictive Control (MPC)
Published 2012“…Testing for various mismatch scenarios for both two major contributors to the process, the algorithm was able to bring the output back to the desired set-point in a very short time.…”
Get full text
Get full text
Final Year Project -
14
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
15
Development of cellular neural network algorithm for detecting lung cancer symptoms
Published 2012Get full text
Working Paper -
16
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…In this thesis, a combination of spatial signal processing with temporal signal processing is proposed. …”
Get full text
Get full text
Thesis -
17
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
18
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Fault detection and diagnosis using correlation coefficients
Published 2005“…Normal Correlation (NC), Principal Component Analysis (PCA) and Partial Correlation Analysis (PCorrA) are used to develop the correlation coefficients between the selected key process variables with the quality variables of interest in the process from the NOC data. …”
Get full text
Get full text
Thesis -
20
