Search Results - (( variable location detection algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…Also, a scoring algorithm has been implemented, to evaluate the classification ability of the algorithm and the early fault detection ability. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…Secondly, the data collected from the main valve chamber controllers, which are located in the main pipes. The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Road Sign Detection and Recognition System for Real-Time Embedded Applications by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2011
    “…In this paper, we propose a road sign detection and recognition algorithm for an embedded application, which requires computationally simple but accurate algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…A test on the capability of the model for fault detection revealed that it is possible to detect inlet temperature changes as low as 5 deg. …”
    Get full text
    Conference or Workshop Item
  6. 6

    An Automated Method For Model-Plant Mismatch Detection And Correction In Process Plants Employing Model Predictive Control (MPC) by Ahmed Bahakim, Sami Saeed

    Published 2012
    “…Therefore, detection of the location of the mismatch is needed so that only that channel is re-identified. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Iris segmentation and normalization approach by Shamsi, Mahboubeh, Saad, Puteh, Rasouli, Abdolreza

    Published 2008
    “…Iris is located by using a variable parameter binning approach. …”
    Get full text
    Get full text
    Article
  9. 9

    An Optimized Semantic Segmentation Framework for Human Skin Detection by Huong, Audrey, Ngu, Xavier

    Published 2024
    “…Existing approaches used complex and various heuristic designs of image processing algorithms and deep models customized for skin detection problems. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Detection of energy theft and defective smart meters in smart grids using linear regression by Yip, S.C., Wong, K., Hew, W.P., Gan, M.T., Phan, R.C.W., Tan, S.W.

    Published 2017
    “…Categorical variables and detection coefficients are also introduced in the model to identify the periods and locations of energy frauds as well as faulty smart meters. …”
    Get full text
    Get full text
    Article
  11. 11

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…A cluster pattern of landslide locations was extracted in previous study using nearest neighbor index (NNI), which were then used to identify the clustered landslide locations range. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modelling of cupping suction system based on system identification method by Suresh, Kavindran, Ghazali, M. R., Ahmad, M. A.

    Published 2022
    “…In contrast, the input variable is determined by the speed of the pump applied in various locations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    On line fault detection for transmission line using power system stabilizer signals by Ali Falifla, Hamza AbuBeker

    Published 2007
    “…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
    Get full text
    Get full text
    Thesis
  15. 15

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…There are two strategies that have been implemented in the numerical solutions which are the variable step size and the variable step size and variable order. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Breast Cancer Diagnosis Using Neuro-CBR Approach by Norlia, Md. Yusof

    Published 2005
    “…Once a breast cancer is detected, it can be classified a benign (not cancerous tissue) or malignant (cancerous tissue). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…The input and output data were used to create this modeling output variable of the cupping suction system is detected by connecting a differential pressure sensor to the cup, while the input variable is determined by the speed of the pump applied in various locations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The motor features are extracted through the proposed Discrete Wavelet Transform (DWT) based analysis method, while the wavelet inlet acts as an expert tool to adapt the right controller in accordance with the fault type. The fault detection algorithm identifies the time and location of each fault. …”
    Get full text
    Get full text
    Thesis