Search Results - parallel detection ((((model algorithm) OR (modified algorithm))) OR (based algorithm))
Search alternatives:
- parallel detection »
-
1
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…The significant reduction of oscillation in power is observed to be due to implementation of the modified P&O.As a conclusion, the DSMPP algorithm has successfully been performed to detect the GMPP under PSCs in minimum time, with low oscillation in power, and high accuracy as detecting the GMPP for different scenarios of shadowing.…”
Get full text
Get full text
Thesis -
2
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
3
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
4
New CFAR algorithm and circuit development for radar receiver
Published 2020“…All these algorithms are simulated using MATLAB and applied them to three different clutter models that represent different environment cases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A parallel ensemble learning model for fault detection and diagnosis of industrial machinery
Published 2023“…Composed of three levels of learning, the proposed ensemble model employs two base learners and a meta-learner, and is executed in parallel processing platform to achieve efficient computation. …”
Get full text
Get full text
Get full text
Article -
6
-
7
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Active contour model on digital mammograms using low-cost parallel computing systems
Published 2009“…The numerical simulation of digital mammograms is based on the Active Contour model in satisfying the finite difference of Euler equation technique. …”
Get full text
Book Section -
9
Toward heterogeneous computing to facilitate sequential OLAP real-time applications
Published 2016“…The optimized algorithm is dedicated to detect patterns over parallel data streams in Real-Time. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
Published 2007Get full text
Get full text
Conference or Workshop Item -
11
A coded aperture-based 3D SPECT imaging system for early breast cancer detection
Published 2023“…For the breast phantom, simulations were repeated for different lesion sizes and the tumor-to-background ratio (TBR). The proposed CA-based SPECT camera employs a mosaic MURA mask and antimask combined with the Maximum Likelihood Expectation Maximization (MLEM) algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
Article -
13
-
14
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…The parallel algorithm for the simulation of human tumor growth is a new invention at the present time. …”
Get full text
Get full text
Get full text
Get full text
Book -
15
Comparison of Wenner and dipole-dipole arrays in the study of an underground three-dimensional cavity
Published 2010“…A three-dimensional least-squares algorithm, based on the robust inversion method, was used in the inversion of the apparent resistivity data. …”
Get full text
Article -
16
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…This algorithm is based on two detection schemes; namely active and passive. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Enhanced and effective parallel optical flow method for vehicle detection and tracking
Published 2016“…With a view to do improvements, it is proposed to develop an unique algorithm for vehicle data recognition and tracking using Parallel Optical Flow method based on Lucas-Kanade algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
19
A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction
Published 2013“…The novelty control design is an artificial neural network (ANN) adopting a modified mathematical algorithm (a modified delta rule weight-updating W-H) and a suitable alpha value (learning rate value) which determines the filters optimal operation. …”
Get full text
Get full text
Conference or Workshop Item -
20
A test case generation framework based on UML statechart diagram
Published 2018“…This research adds new knowledge to the software testing field, especially for testing processes in the model-based techniques, testing activity, and testing tool support.…”
Get full text
Get full text
Get full text
Get full text
Thesis
