Search Results - more ((((function algorithm) OR (control algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel
Published 2018“…Employing single sEMG channel with computation efficient control algorithm leads to reducing the cost and the size of the soft robotic glove system and make it more practical for utilization in daily basis.…”
Get full text
Get full text
Conference or Workshop Item -
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
3
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
4
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
MBIST implementation and evaluation in FPGA based on low-complexity March algorithms
Published 2024“…This paper presents the implementation and validation of MBIST controllers that applied the March AZ1 and March AZ2 algorithms in a Field-Programmable Gate Array (FPGA) device. …”
Get full text
Get full text
Get full text
Article -
6
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…It solved the multi-objective functions of RNP challenge. In the validation process, the results showed a superior finding compared to the firefly algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Model-based fault detection and diagnosis optimization for process control rig
Published 2013“…In this paper, fuzzy logic based model using genetic algorithm for optimizing the membership function is used in the development of fault detection and diagnosis of a process control rig. …”
Get full text
Get full text
Conference or Workshop Item -
8
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
9
MOBILE ROBOT
Published 2004“…These are to be achieved by Voronoi Diagram or Delaunay Triangulation method for mapping, and a combination of one or more of the Dijkstra, Bellman, Ford, Moore, Johnson, Floyd-Warshal, or A* algorithms for best path calculation. …”
Get full text
Get full text
Final Year Project -
10
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…Afterwards control algorithms have been successfully developed and implemented in the motor control hardware. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
12
UAV actuator fault detection through artificial intelligent technique / Zulhilmy Sahwee ... [et al.]
Published 2018“…However, the recent, a dramatic improvement in computer speed and the development of more efficient algorithms have changed the situation considerably. …”
Get full text
Get full text
Article -
13
UAV actuator fault detection through artificial intelligent technique
Published 2023“…However, the recent, a dramatic improvement in computer speed and the development of more efficient algorithms have changed the situation considerably. …”
Article -
14
Novel hybrid maximum power point tracking algorithm for PV systems under partially shaded conditions
Published 2015Get full text
Get full text
Conference or Workshop Item -
15
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
16
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
Published 2017“…Ant colony optimization (ACO) is a metaheuristic algorithm that has been successfully applied to several types of optimization problems such as scheduling, routing, and more recently for solving protein functional module detection (PFMD) problem in protein-protein interaction (PPI) networks. …”
Get full text
Get full text
Thesis -
17
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
Published 2017“…Ant colony optimization (ACO) is a metaheuristic algorithm that has been successfully applied to several types of optimization problems such as scheduling, routing, and more recently for solving protein functional module detection (PFMD) problem in protein-protein interaction (PPI) networks. …”
Get full text
Get full text
Thesis -
18
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
19
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…The classifications of various attacks along with the intrusions detection methods have been highlighted. Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
Get full text
Get full text
Get full text
Article -
20
Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process
Published 2017“…Thus, for increases the efficiency of solar desalination plant, the solar tracking system was designed to make the system more flexible to trap the sunlight. The main mechanism of the solar tracking system consists of the tracking device, tracking algorithm, control unit, positioning system, driving mechanism and sensing devices. …”
Get full text
Get full text
Undergraduates Project Papers
