Search Results - (( variable generation using algorithm ) OR ( parameter detection method algorithm ))*
Search alternatives:
- variable generation »
- parameter detection »
- generation using »
- method algorithm »
- using algorithm »
-
1
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
2
DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION
Published 2018“…Therefore, the main objective of the project is to develop an OE-based Brown-Forsythe test algorithm to effectively detect the presence of control valve stiction.In this study, the proposed OE model is developed using System Identification in MATLAB, where it is used to simulate the process output (PV). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
4
Vibration analysis for early detection of bearing failures
Published 2024“…The vibration monitoring algorithm utilizes time-domain parameters, frequency domain analysis, and envelope analysis to assess bearing conditions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Numerical Analysis of structural batteries response with the presence of uncertainty
Published 2023“…To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Article -
6
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. Forward chaining strategy is used to interpret the rule-based system. …”
Get full text
Get full text
Article -
7
Numerical Analysis of Structural Batteries Response with the Presence of Uncertainty
Published 2023“…To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
Get full text
Get full text
Thesis -
9
Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW
Published 1996“…In continuation of this work, a cascade control system for control of welding velocity as well as an algorithm for off·line generation and control of weld 3-D trajectory was developed.…”
Get full text
Get full text
Thesis -
10
Modeling of cupping suction system based on system identification method
Published 2022“…The input and output data were used to create this modeling output variable of the cupping suction system is detected by connecting a differential pressure sensor to the cup, while the input variable is determined by the speed of the pump applied in various locations. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Development of new code for optical code division multiple access systems
Published 2011“…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
Get full text
Thesis -
12
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
Get full text
Get full text
Thesis -
13
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
14
Stochastic Modelling Of Bioethanol Fermentation By Saccharomyces Cerevisiae Grown In Oil Palm Residues
Published 2015“…However, this result might differ if it is to be reduplicated due to heterogeneity of OPT sap and POME as well as variability in Baker’s yeast’s performance. Therefore, a predictability test was carried out using Monte Carlo algorithm. …”
Get full text
Get full text
Thesis -
15
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
16
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
17
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
18
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
19
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis
