Search Results - adoption a different ((estimation algorithm) OR (detection algorithm))
Search alternatives:
- estimation algorithm »
- a different »
- adoption a »
-
1
Distribution network fault section estimation using analytical database approach
Published 2004“…This thesis describes the development or a new fault section estimation algorithm in a distribution network. …”
Get full text
Get full text
Get full text
Thesis -
2
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
3
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…An ensemble of these algorithms is an intelligent and adaptive solution, producing a clean output, while preserving significant pixel information. …”
Get full text
Get full text
Get full text
Thesis -
4
GENETIC FUZZY FILTER BASED ON MAD AND ROAD TO REMOVE MIXED IMPULSE NOISE
Published 2010“…Based on the fuzzy inference result, the fuzzy switching scheme that adopts median filter as the main estimator is applied to the filtering. …”
Get full text
Get full text
Thesis -
5
An active lower-extremity exoskeleton for synchronous mobility assistance in lifting and carrying manual handling task / Sado Fatai
Published 2019“…The control system can assist wearers’ movement by a new synergy of three controller algorithms: a dual unscented Kalman filter (DUKF) for trajectory estimation and model update, an impedance controller for generation of assistive torque, and a new supervisory control algorithm for pilot movement detection and synchronization with the exoskeleton. …”
Get full text
Get full text
Get full text
Thesis -
6
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The obtained result from the twelve deployed ML algorithms for the standalone intelligent ML-APS relay classifier modification without communication medium adoption for transmitting and receiving the updated relay operation settings during network configuration changes. …”
Get full text
Get full text
Thesis -
7
A Computationally Efficient Least Square Channel Estimation Method for MIMO-OFDM Systems
Published 2021“…The 5th generation of cellular system is expected to incur a huge traffic rise which would necessitate the adoption of an estimation method that is efficient but at the same time practical through easy implementation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
SVM for network anomaly detection using ACO feature subset
Published 2016“…KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. …”
Get full text
Get full text
Conference or Workshop Item -
9
Weighting method for modal parameter based damage detection algorithms
Published 2011“…When researchers use bending modes for the purpose of damage detection, a number of available modes are adopted, each of which return a value indicating the severity of damage. …”
Get full text
Get full text
Article -
10
Finite impulse response optimizers for solving optimization problems
Published 2019“…The first algorithm is a single-agent-based algorithm, named Single-agent FIR optimizer (SAFIRO). …”
Get full text
Get full text
Thesis -
11
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
12
Finite impulse response optimizers for solving optimization problems
Published 2019“…The first algorithm is a single-agent-based algorithm, named Single-agent FIR optimizer (SAFIRO). …”
Get full text
Get full text
Thesis -
13
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…In the third algorithm, a soft assignment technique using fuzzy encoding is used to transform low-level features into a higher-level feature representation. …”
Get full text
Get full text
Thesis -
16
Evolutionary approach for combinatorial testing of software product lines
Published 2020“…The approaches are (1) adopting an Estimation of Distribution Algorithm approach to aid the construction of a covering array driven by second order feature dependence, and (2) construct a feature configuration dependence graph to assist in building the variable-strength covering array. …”
Get full text
Get full text
Thesis -
17
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Multisensor Data Fusion Algorithm for Contactless 3D Position Measurement for Post-Stroke Hand Rehabilitation
Published 2018“…The presence of the exercise ball in the hand adds a degree of difficulty to the problem when an optical solution is adopted. …”
Get full text
Get full text
Monograph
