Search Results - candidate ((((control algorithm) OR (function algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Preliminary finding on the switching control algorithm for the stabilization of the DC-DC Zeta converter. by Sarkawi, Hafez, Yoshito, Ohta, Paolo, Rapisarda

    Published 2018
    “…We derive a switching control law based on a control Lyapunov function candidate to navigate the states to the operating point. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Position control of robot manipulator: Design a novel SISO adaptive sliding mode fuzzy PD fuzzy sliding mode control. by Sulaiman, Nasri, Piltan, Farzin, Allahdadi, Sadeq, Dialame, Mohammadali, Abbas, Zulkifly

    Published 2011
    “…To attenuate the chattering phenomenon this method developed a linear boundary layer and the parameter of the sliding function is online tuned by adaptation laws. This algorithm will be analyzed and evaluated on robotic manipulators and design adaption laws of adaptive algorithms after that writing Lyapunov function candidates and prove the asymptotic convergence of the closed-loop system using Lyapunov stability theorem mathematically. …”
    Get full text
    Get full text
    Article
  3. 3

    Levy tunicate swarm algorithm for solving numerical and real-world optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…We took advantage of Levy flight, which solved the local optima problem and improved traditional TSA efficiency. The proposed LTSA algorithm performance was evaluated using 23 well-known benchmark test functions, namely unimodal benchmark functions, multimodal benchmark functions, and fixed-dimension multimodal benchmark functions, as well as compared with the traditional TSA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Levy slime mould algorithm for solving numerical and engineering optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…We took advantage of the Levy flight, which solved the local optima problem and improved traditional SMA efficiency. The proposed LSMA algorithm performance was evaluated using 23 well-known benchmark test functions, namely unimodal benchmark functions, multimodal benchmark functions, and fixed-dimension multimodal benchmark functions, as well as compared with the traditional SMA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
    Get full text
    Thesis
  6. 6
  7. 7

    Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network by Adam, A., Ibrahim, Z., Mokhtar, N., Shapiai, M.I., Mubin, M.

    Published 2016
    “…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
    Get full text
    Get full text
    Article
  8. 8

    Optimizing S-box generation based on the Adaptive Agent Heroes and Cowards Algorithm by Kamal Z., Zamli

    Published 2021
    “…The main feature of AAHC is the fact that the algorithm allows adaptive assignment of its population agents into cowards and heroes based on the exponential controlling functions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A new multiobjective tiki-taka algorithm for optimization of assembly line balancing by M. F. F., Ab Rashid, Ariff Nijay, Ramli

    Published 2023
    “…The algorithm makes all solution candidates have contributions to the algorithm convergence.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy by Fadhil Mukhlif , Aswad Al-Obaidy

    Published 2020
    “…In order to prove the effectiveness of such algorithms, numerical solutions are used in comparison with current power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network by Asrul, Adam, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai, Marizan, Mubin

    Published 2016
    “…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The algorithms were examined on two real datasets, namely, NSL-KDD and Landsat. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An effective source number enumeration approach based on SEMD by Ge, Shengguo, Mohd Rum, Siti Nurulain, Ibrahim, Hamidah, Marsilah, Erzam, Perumal, Thinagaran

    Published 2022
    “…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
    Get full text
    Get full text
    Article
  16. 16

    Dynamic modelling of proton exchange membrane fuel cell system for electric bicycle / Azadeh Kheirandish by Azadeh, Kheirandish

    Published 2016
    “…Recent models provide high accuracies using complex systems and complicated calculations using advanced optimization algorithms. However, designing an accurate dynamic model for prediction and controlling the system in a real time condition is a challenge in this field. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…In addition, 10 gasses are detected with zero values for both the entropy and the chi- square test, and these gasses are the strongest candidates to detect and classify odours. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification by Hussain, A., Hussain, S.S., Uddin, M.M., Zubair, M., Kumar, P., Umair, M.

    Published 2022
    “…In this study, exhaustive empirical research of the machine learning algorithm for hand posture classification has been established. …”
    Get full text
    Get full text
    Article
  19. 19

    Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method by Hasan, Nurul

    Published 2010
    “…Once the aggregator node becomes non functional, it affects the whole cluster. We introduce a candidate cluster head node on the basis of node density. …”
    Get full text
    Get full text
    Citation Index Journal
  20. 20

    3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain by Paidi, Zulfikri, Muhd Zain, Nurzaid

    Published 2016
    “…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article