Search Results - ((detection algorithm) OR (((function algorithm) OR (control algorithm))))
Search alternatives:
-
1
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel
Published 2018“…Therefore, hand robotic devices can be essential tools to help individuals afflicted with hand deficit to perform activities of daily living in addition to the possibility of restoring hand functions by home rehabilitation. In this paper, a real time muscle activity detection algorithm has been developed to control a pneumatic actuated soft robotic glove intended for patients with grasping impairment. …”
Get full text
Get full text
Conference or Workshop Item -
3
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…Surface defect segmentation algorithms in Automatic Optical Inspection (AOI) system for modern manufacturing industries provide solutions to quality control with speed, volume and traceability. …”
Get full text
Get full text
Thesis -
4
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis -
5
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. …”
Get full text
Get full text
Thesis -
7
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
Published 2018“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Article -
8
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…A high-complexity test algorithm like the March MSS (18N) can guarantee the detection of all unlinked static faults in SRAM. …”
Get full text
Get full text
Get full text
Article -
9
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…The effectiveness of the framework algorithm is shown through lemma proof.…”
Get full text
Get full text
Conference or Workshop Item -
10
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…The effectiveness of the framework algorithm is shown through lemma proof. © 2016 IEEE.…”
Get full text
Get full text
Article -
11
A new 13N-complexity memory built-in self-test algorithm to balance static random access memory static fault coverage and test time
Published 2025“…The newly produced March AZ1 algorithm was successfully implemented in an MBIST controller. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…In this regard, EC requires the incorporation of additional evaluation functions, hence, additional computation time. A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
16
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
MBIST implementation and evaluation in FPGA based on low-complexity March algorithms
Published 2024“…This paper presents the implementation and validation of MBIST controllers that applied the March AZ1 and March AZ2 algorithms in a Field-Programmable Gate Array (FPGA) device. …”
Get full text
Get full text
Get full text
Article -
18
The impact of executive function and aerobic exercise recognition in obese children under deep learning
Published 2025“…The OpenPose motion recognition model optimized with STN and Lucas–Kanade optical flow algorithm not only exhibits superior performance in keypoint detection and pose estimation but also positively influences the physical health and functional capacity of children.…”
Get full text
Get full text
Article -
19
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
20
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…It solved the multi-objective functions of RNP challenge. In the validation process, the results showed a superior finding compared to the firefly algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
