Search Results - mode ((((electron algorithm) OR (selection algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…An improved version of Salp Swarm Algorithm (ISSA) is proposed in this study to solve feature selection problems and select the optimal subset of features in wrapper-mode. …”
Get full text
Get full text
Article -
2
Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad
Published 2018“…A metaheuristic algorithm in the UFLS scheme can be used to select the best load combination in real time. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals
Published 2022“…Hence, a simplified feature selection method is necessary. This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
Get full text
Get full text
Get full text
Article -
5
Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals
Published 2022“…Hence, a simplified feature selection method is necessary. This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
Fast mode decision algorithm
Published 2011“…Fast mode decision is the developed algorithm intended for selectively choosing the mode decision used by the encoder. …”
Get full text
Get full text
Get full text
Book Chapter -
9
An efficient detection model of selective forwarding attacks in wireless mesh networks
Published 2012“…In our approach, we also propose a multi-hop acknowledgement based algorithm to analyze and detect the malicious behavior to defend against selective forwarding attacks in WMNs. …”
Get full text
Get full text
Get full text
Article -
10
Defect detection based on extreme edge of defective region histogram
Published 2018“…This study proposes a new automatic thresholding algorithm based on the acquisition of the defective region histogram and the selection of its extreme edge as the threshold value to segment all defective objects in the foreground from the image background. …”
Get full text
Get full text
Article -
11
Event Priority Driven Dissemination EPDD Management Algorithm For Low Power WSN Nodes Powered By A Dual Source Energy Harvester
Published 2020“…This algorithm serves both to detect the availability of the energy source and to control the nodes’ sleep mode. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
-
13
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Article -
14
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Get full text
Article -
15
Focal and non-focal epilepsy localization: a review
Published 2018“…This study reviews many recently-proposed algorithms for detecting the focal epileptic seizures. …”
Get full text
Get full text
Get full text
Article -
16
A survey of component carrier selection algorithms for carrier aggregation in long term evolution-advanced
Published 2017“…It can be concluded from the study that the CC selection algorithms for newly-arrived LTE users can benefit from the channel diversity and the load status whereas the carrier aggregation that does not allocate all of the available CCs to the newly arrived LTE-A users shown to be more efficient.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…Such offline mode is not suitable for IoT applications such as monitoring, surveillance and alert system which needs to detect events at real-time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
20
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…Five independent parameters(gender, race, hometown, family income, university entry mode) have been selected to conduct this study. These parameters are chosen based on prior research studies including from social sciences domains. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
