Search Results - (( variable simulation based algorithm ) OR ( parameters detection method algorithm ))

Refine Results
  1. 1

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION by JOLENE DIANDRA, JAMES

    Published 2018
    “…Therefore, the main objective of the project is to develop an OE-based Brown-Forsythe test algorithm to effectively detect the presence of control valve stiction.In this study, the proposed OE model is developed using System Identification in MATLAB, where it is used to simulate the process output (PV). …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3

    A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification by Kamaruddin, B., Zabiri, H., Mohd Amiruddin, A.A.A., Teh, W.K., Ramasamy, M., Jeremiah, S.S.

    Published 2020
    “…Control valve stiction is a long-standing problem within process industries. In most methods for shape-based stiction detection, they rely heavily on the traditional controller output (OP) and process variable (PV) plot (i.e. …”
    Get full text
    Get full text
    Article
  4. 4

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
    Get full text
    Get full text
    Article
  5. 5

    Numerical Analysis of structural batteries response with the presence of uncertainty by Syahiir Kamil, Ahmad Kamal Ariffin, Abdul Hadi Azman, Mohamad Syazwan Zafwan Mohamad Suffian

    Published 2023
    “…The proposed research is devoted to the uncertainty analysis of structural battery behavior under various parameters. To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Robust Estimation Methods And Outlier Detection In Mediation Models by Fitrianto, Anwar

    Published 2010
    “…Mediation models refer to the relationships among three variables: an independent variables (IV), a potential mediating variable (M), and a dependent variable (DV). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Numerical Analysis of Structural Batteries Response with the Presence of Uncertainty by Syahiir, Kamil, Mohamad Syazwan Zafwan, Mohamad Suffian, Ahmad Kamal Ariffin, Mohd Ihsan, Abdul Hadi, Azman

    Published 2023
    “…The proposed research is devoted to the uncertainty analysis of structural battery behavior under various parameters. To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Speed sensorless control for PMSM drives using Extended Kalman Filter by Mat Lazi, Jurifa, Nordin, Mohamad Ikhwan, Talib, Md Hairul Nizam, Ibrahim, Zulkifilie

    Published 2021
    “…Therefore, this project proposes sensorless control using an EKF. This method provides an optional estimation algorithm for the non-linear system that can produce a fast and accurate estimation of state variables. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
    Get full text
    Thesis
  10. 10

    Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW by Sadeghi, Mir Bahram H.

    Published 1996
    “…Weld process parameters such as base current and time, pulse current and time, electrode tip to workpiece distance, filler traveling speed, torch speed and workpiece thickness were used for finding the equations which describe the interrelationship between the aforementioned variables and penetration depth as well as bead width. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…The proposed control algorithm takes advantage of a predefined Lyapunov control law which minimizes the required calculation time by the Lyapunov model equations just once in each control loop to predict future variables. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models by ul Islam, B., Baharudin, Z.

    Published 2017
    “…The results show that the neural network optimized with genetic algorithm and trained with an optimally and intelligently selected input vector containing historical load and meteorological variables produced the best prediction accuracy. © 2017, UK Simulation Society. …”
    Get full text
    Get full text
    Article
  15. 15

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis