Search Results - adoption _ difference ((estimation algorithm) OR (detection algorithm))

Refine Results
  1. 1

    Distribution network fault section estimation using analytical database approach by Mokhtar, Ahmad Safawi

    Published 2004
    “…This thesis describes the development or a new fault section estimation algorithm in a distribution network. This is the main part of the research which investigates how the voltage sag can be used to estimate the fault section 111 the distribution network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…Unlike traditional methods that usually start with detection and followed by denoising, the model initially leverages the powerful ability of deep CNN architecture to separate noise from noisy image, then adopts PSO to pinpoint the most optimized threshold values for detecting impulse noisy pixels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    GENETIC FUZZY FILTER BASED ON MAD AND ROAD TO REMOVE MIXED IMPULSE NOISE by JANAH, NUR ZAHRATI

    Published 2010
    “…Based on the fuzzy inference result, the fuzzy switching scheme that adopts median filter as the main estimator is applied to the filtering. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The obtained result from the twelve deployed ML algorithms for the standalone intelligent ML-APS relay classifier modification without communication medium adoption for transmitting and receiving the updated relay operation settings during network configuration changes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An active lower-extremity exoskeleton for synchronous mobility assistance in lifting and carrying manual handling task / Sado Fatai by Sado , Fatai

    Published 2019
    “…The control system can assist wearers’ movement by a new synergy of three controller algorithms: a dual unscented Kalman filter (DUKF) for trajectory estimation and model update, an impedance controller for generation of assistive torque, and a new supervisory control algorithm for pilot movement detection and synchronization with the exoskeleton. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A Computationally Efficient Least Square Channel Estimation Method for MIMO-OFDM Systems by Ahmad, Hasan, Motakabber, S. M. A., Anwar, Farhat, Habaebi, Mohamed Hadi, Ibrahimy, Muhammad Ibn

    Published 2021
    “…Some of the most popular methods used in cellular communication for channel estimation are the Least Squares (LS) algorithm and the Minimum Mean Square Error (MMSE) algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  10. 10

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Finite impulse response optimizers for solving optimization problems by Ab Rahman, Tasiransurini

    Published 2019
    “…In this work, three new estimation-based metaheuristic algorithms are introduced. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Finite impulse response optimizers for solving optimization problems by Tasiransurini, Ab Rahman

    Published 2019
    “…In this work, three new estimation-based metaheuristic algorithms are introduced. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA) by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Ferda, Ernawan, Syifak, Izhar Hisham, Mohd Faizal, Ab Razak

    Published 2023
    “…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evolutionary approach for combinatorial testing of software product lines by Sahid, Mohd Zanes

    Published 2020
    “…The approaches are (1) adopting an Estimation of Distribution Algorithm approach to aid the construction of a covering array driven by second order feature dependence, and (2) construct a feature configuration dependence graph to assist in building the variable-strength covering array. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20